Description
The Email Tracker – Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 5.3.15 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2025-10-22
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive database information exposure
Action: Patch upgrade
AI Analysis

Impact

The plugin Email Tracker suffers from an SQL Injection flaw triggered by the 'orderby' parameter. Insufficient escaping and lack of prepared statements allow an attacker with Administrator-level access to inject and execute arbitrary SQL commands. The resulting impact is the unauthorized extraction of sensitive data from the WordPress database, constituting a data exposure vulnerability.

Affected Systems

WordPress sites using the Email Tracker plugin version 5.3.15 or earlier are affected. The vulnerable vendor is pmbaldha and the product is Email Tracker. All releases up to and including 5.3.15 contain the flaw.

Risk and Exploitability

The CVSS score of 4.9 indicates a moderate severity. The EPSS score is below 1%, reflecting a very low probability of exploitation in the wild. The vulnerability requires authenticated access at the Administrator level, so the attack surface is limited to sites where such credentials exist. The flaw does not appear in the CISA KEV catalog, and no widespread exploitation has been reported.

Generated by OpenCVE AI on April 21, 2026 at 02:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Email Tracker plugin to the latest available version where the SQL injection issue is resolved.
  • Restrict or eliminate Administrator-level accounts that have access to the plugin, ensuring that only trusted users possess such privileges.
  • Implement strict input validation for the 'orderby' parameter within the plugin’s configuration or disable the feature if it is not required, thereby preventing malicious query formation.

Generated by OpenCVE AI on April 21, 2026 at 02:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 10 Apr 2026 04:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 08 Apr 2026 19:30:00 +0000


Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Description The Email Tracker – Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 5.3.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The Email Tracker – Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 5.3.15 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Email Tracker <= 5.3.12 - Authenticated (Admin+) SQL Injection Email Tracker <= 5.3.15 - Authenticated (Admin+) SQL Injection
References

Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Pmbaldha
Pmbaldha email Tracker
Wordpress
Wordpress wordpress
Vendors & Products Pmbaldha
Pmbaldha email Tracker
Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 08:45:00 +0000

Type Values Removed Values Added
Description The Email Tracker – Email Log, Email Open Tracking, Email Analytics & Email Management for WordPress Emails plugin for WordPress is vulnerable to SQL Injection via the 'orderby' parameter in all versions up to, and including, 5.3.12 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Email Tracker <= 5.3.12 - Authenticated (Admin+) SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Pmbaldha Email Tracker
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:31:23.788Z

Reserved: 2025-09-05T18:41:12.227Z

Link: CVE-2025-10047

cve-icon Vulnrichment

Updated: 2025-10-22T14:05:37.858Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T09:15:31.473

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10047

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:15:06Z

Weaknesses