Impact
The WP Dispatcher plugin for WordPress allows an authenticated user with Contributor or higher privileges to inject arbitrary SQL via the unsanitized 'id' parameter. The injection can append additional statements to the existing query, enabling the attacker to extract sensitive data from the database.
Affected Systems
The vulnerability affects the ekndev WP Dispatcher plugin for WordPress versions up to and including 1.2.0. Users running WordPress installations with this plugin installed before the 1.2.1 release are impacted.
Risk and Exploitability
The CVSS score of 8.8 categorizes this flaw as high severity. The EPSS score of < 1% suggests a low likelihood of exploitation in the wild, yet the lack of a CISA KEV listing does not negate its risk. Attackers must first authenticate and possess at least Contributor level access, after which they can craft malicious 'id' values to append SQL, potentially exfiltrating database contents.
OpenCVE Enrichment
EUVD