Impact
The ArielBrailovsky‑ViralAd WordPress plugin has a flaw that allows anyone who can send a request to its printResultAndDie() function to inject arbitrary SQL via the 'id' parameter. Because the plugin fails to escape or prepare the user supplied value, attackers can append new SQL statements to the existing query and retrieve sensitive database contents. This is a classic SQL injection vulnerability (CWE‑89) that compromises data confidentiality for the WordPress site.
Affected Systems
The affected product is the ArielBrailovsky‑ViralAd plugin for WordPress, all released versions up to and including 1.0.8. The vulnerability is only exploitable when the WordPress core is very old, so any WordPress installation deploying the plugin in that version range on an outdated core is at risk. The plugin’s code remains unchanged but the environment requirement limits its usefulness in newer core installations.
Risk and Exploitability
The CVSS score of 7.5 indicates a high‑severity flaw, while an EPSS score of less than 1 % suggests a low probability of exploitation in the wild. It is not listed in the CISA KEV catalog. Based on the description, it is inferred that the attack vector is an unauthenticated HTTP request to the plugin’s endpoint with a crafted 'id' value, requiring no authentication or special privileges to reach the vulnerable code.
OpenCVE Enrichment
EUVD