Description
The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'infility_get_data' API action in all versions up to, and including, 2.14.46. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append - with certain server configurations - additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-02-04
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated SQL Injection enabling data extraction
Action: Apply Patch
AI Analysis

Impact

The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection through the 'infility_get_data' API action in all releases up to version 2.14.46. The flaw stems from insufficient escaping of user‑supplied input and the absence of prepared statements, which lets an attacker embed additional SQL statements when the server multiple statements per query. This can be used to read sensitive data from the WordPress database, potentially compromising confidentiality of site content and stored credentials. The weakness is classified as CWE‑89, an SQL Injection vulnerability where untrusted data reaches an SQL parser without proper sanitization.

Affected Systems

All instances of the Infility Global WordPress plugin with version 2.14.46 or earlier are affected. The affected product, offered by Infility, supports WordPress sites where the plugin has been installed and the default 'infility_get_data' API endpoint is exposed.

Risk and Exploitability

The CVSS score of 7.5 places the issue in the high‑severity range, while the EPSS score of less than 1% indicates a low probability of exploitation at this time. The vulnerability is not listed in CISA’s KEV catalog, suggesting no public exploits have been discovered yet. Based on the description, the likely attack vector is an unauthenticated web request to the plugin’s API endpoint, which can be performed from any IP that bypasses the IP whitelist due to a predictable API key. Once the endpoint is accessed, an attacker can inject SQL fragments to retrieve database data.

Generated by OpenCVE AI on April 21, 2026 at 23:49 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Infility Global plugin to the latest available version.
  • If an update is not immediately possible, disable the 'infility_get_data' API action or remove the plugin entirely to eliminate the vulnerable entry point.
  • As a temporary measure, configure WordPress to deny all external IP addresses from accessing the plugin API or use a custom firewall rule that blocks requests containing SQL control characters.

Generated by OpenCVE AI on April 21, 2026 at 23:49 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 04 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Infility
Infility infility Global
Wordpress
Wordpress wordpress
Vendors & Products Infility
Infility infility Global
Wordpress
Wordpress wordpress

Wed, 04 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description The Infility Global plugin for WordPress is vulnerable to unauthenticated SQL Injection via the 'infility_get_data' API action in all versions up to, and including, 2.14.46. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append - with certain server configurations - additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Infility Global <= 2.14.46 - Unauthenticated SQL Injection via Predictable API Key and IP Whitelist Bypass
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Infility Infility Global
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:57:36.184Z

Reserved: 2025-12-29T17:44:34.360Z

Link: CVE-2025-15268

cve-icon Vulnrichment

Updated: 2026-02-04T17:01:25.649Z

cve-icon NVD

Status : Deferred

Published: 2026-02-04T09:15:50.690

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-15268

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:00:03Z

Weaknesses