Description
The My auctions allegro plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter in all versions up to, and including, 3.6.31 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2025-10-11
Score: 4.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Sensitive data exposure via SQL injection
Action: Patch required
AI Analysis

Impact

The My Auctions Allegro plugin for WordPress contains an SQL injection flaw in the 'order' parameter. The input is not properly escaped and the existing database query is built without prepared statements, allowing attackers who are authenticated with at least Administrator privileges to append arbitrary SQL statements. This flaw can be exploited to read sensitive data from the database, such as user information, order details, or any other stored information.

Affected Systems

The affected product is the WordPress plugin My Auctions Allegro, distributed by wphocus. All released versions up to and including version 3.6.31 are vulnerable. Any WordPress installation that hosts one of these versions of the plugin is at risk.

Risk and Exploitability

The CVSS score of 4.9 indicates moderate severity, and the EPSS score of less than 1% suggests that exploitation is unlikely in the wild. The vulnerability is listed as not in the CISA KEV catalog. Because the flaw requires administrative access, an attacker must already have legitimate credentials or gain them through other means before issuing a malicious request. Once the proper privileges are in place, injecting malicious SQL via the 'order' parameter can result in data extraction. No public exploit or evidence of widespread attacks is reported.

Generated by OpenCVE AI on April 22, 2026 at 13:11 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the My Auctions Allegro plugin to version 3.6.32 or higher, which removes the vulnerable code.
  • Restrict Administrator access to trusted users and enforce strong password policies to limit credential compromise.
  • If an update is not immediately possible, disable or filter the 'order' parameter or implement input validation to prevent SQL injection payloads.

Generated by OpenCVE AI on April 22, 2026 at 13:11 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 21 Oct 2025 13:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Wphocus
Wphocus my Auctions Allegro
Vendors & Products Wordpress
Wordpress wordpress
Wphocus
Wphocus my Auctions Allegro

Tue, 14 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 11 Oct 2025 07:30:00 +0000

Type Values Removed Values Added
Description The My auctions allegro plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter in all versions up to, and including, 3.6.31 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Administrator-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title My Auctions Allegro Plugin <= 3.6.31 - Authenticated (Admin+) SQL Injection
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 4.9, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Wordpress Wordpress
Wphocus My Auctions Allegro
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:06:11.528Z

Reserved: 2025-09-05T18:45:35.058Z

Link: CVE-2025-10048

cve-icon Vulnrichment

Updated: 2025-10-14T13:31:15.294Z

cve-icon NVD

Status : Deferred

Published: 2025-10-11T08:15:31.557

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10048

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T13:15:17Z

Weaknesses