Description
The SlimStat Analytics plugin for WordPress is vulnerable to time-based SQL Injection via the ‘args’ parameter in all versions up to, and including, 5.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-02-11
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: SQL injection enabling access to sensitive database data
Action: Patch Upgrade
AI Analysis

Impact

The SlimStat Analytics plugin for WordPress is vulnerable to time‑based SQL injection via the ‘args’ parameter. The flaw exists because the value is insufficiently escaped and the SQL query is not prepared, allowing an attacker to append arbitrary SQL. Because this is limited to authenticated users with Subscriber or higher privileges, the attacker can extract confidential information from the database but cannot compromise the host directly.

Affected Systems

The vulnerability affects versions up to and including 5.3.1 of SlimStat Analytics by veronalabs. No other versions or products are currently listed as affected.

Risk and Exploitability

The CVSS score of 6.5 indicates a medium severity flaw, and the EPSS score of less than 1% suggests a low likelihood of exploitation under current conditions. The issue is not listed in the CISA KEV catalog. An attacker must first authenticate with at least Subscriber-level access; there is no known public exploitation, but the low probability does not eliminate the need to remediate.

Generated by OpenCVE AI on April 21, 2026 at 16:02 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade SlimStat Analytics to version 5.3.2 or later or the latest release from veronalabs
  • If an upgrade is not immediately possible, sanitize the ‘args’ parameter by escaping user input or converting the query to a parameterized statement
  • Restrict or disable the functionality that accepts user supplied ‘args’ values for users with Subscriber + privileges until a patch is applied

Generated by OpenCVE AI on April 21, 2026 at 16:02 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Feb 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 11 Feb 2026 22:15:00 +0000

Type Values Removed Values Added
First Time appeared Veronalabs
Veronalabs slimstat Analytics
Wordpress
Wordpress wordpress
Vendors & Products Veronalabs
Veronalabs slimstat Analytics
Wordpress
Wordpress wordpress

Wed, 11 Feb 2026 01:45:00 +0000

Type Values Removed Values Added
Description The SlimStat Analytics plugin for WordPress is vulnerable to time-based SQL Injection via the ‘args’ parameter in all versions up to, and including, 5.3.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title SlimStat Analytics <= 5.3.1 - Authenticated (Subscriber+) SQL Injection via `args` Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Veronalabs Slimstat Analytics
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:03:27.813Z

Reserved: 2025-11-19T16:16:31.619Z

Link: CVE-2025-13431

cve-icon Vulnrichment

Updated: 2026-02-11T15:37:16.731Z

cve-icon NVD

Status : Deferred

Published: 2026-02-11T02:15:57.667

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-13431

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T16:15:40Z

Weaknesses