Impact
The Featured Image from URL (FIFU) plugin for WordPress contains a vulnerability in its get_posts_with_internal_featured_image() function. The code does not properly escape user supplied parameters and does not prepare the SQL query, allowing an authenticated attacker with Administrator-level access to inject additional SQL statements. This can lead to extraction of sensitive database contents such as user credentials, configuration data, or other confidential information. The weakness is a classic SQL Injection flaw, classified as CWE‑89.
Affected Systems
The flaw affects the marceljm:Featured Image from URL (FIFU) plugin in all releases up to and including version 5.2.7. WordPress sites that have installed this plugin and have users with Administrator or higher roles are impacted.
Risk and Exploitability
According to the CVSS score of 4.9, the technical severity is moderate, and the EPSS score of less than 1% indicates a low likelihood of widespread exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires that an attacker has legitimate administrator credentials; the attack vector is therefore authenticated. If such access is available, the attacker can inject arbitrary SQL to read or exfiltrate data from the WordPress database.
OpenCVE Enrichment
EUVD