Impact
The ProfileGrid – User Profiles, Groups and Communities plugin contains blind and time‑based SQL injection vulnerabilities in the rid and search parameters. Authenticated users with Subscriber role or higher can inject and execute arbitrary SQL statements by appending them to these user‑supplied inputs. This flaw aligns with CWE‑89, and the description indicates attackers could retrieve sensitive data from the database via the injection points.
Affected Systems
WordPress sites that use the Metagauss ProfileGrid plugin, versions up to and including 5.9.4.7.
Risk and Exploitability
The CVSS score of 6.5 reflects a moderate severity, while the EPSS score of less than 1 % indicates a very low likelihood of exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog. An attacker would need authenticated access, typically through a standard login that grants at least Subscriber privileges, and would then manipulate the rid or search fields in plugin requests. Given the lack of public proof‑of‑concept exploits, the chance of widespread impact remains limited, but the potential for data disclosure makes the risk noteworthy.
OpenCVE Enrichment
EUVD