Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Moreconvert Team MC Woocommerce Wishlist smart-wishlist-for-more-convert allows SQL Injection.This issue affects MC Woocommerce Wishlist: from n/a through <= 1.8.9.
Published: 2025-03-27
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper neutralization of special elements in SQL commands, commonly known as SQL injection. The flaw exists in MC Woocommerce Wishlist's smart-wishlist-for-more-convert component, which fails to sanitize user input that becomes part of database queries. Successful exploitation could allow an attacker to read, modify, or delete data in the site’s database, potentially exposing customer details or altering order information. The weakness corresponds to CWE‑89.

Affected Systems

Any installation of MC Woocommerce Wishlist by Moreconvert Team with a version labeled 1.8.9 or earlier is susceptible. Earlier undisclosed versions are also considered vulnerable, as the plugin appears to lack protective checks prior to 1.8.9.

Risk and Exploitability

The CVSS score of 7.6 indicates a high severity risk. The EPSS score of less than 1% implies that the probability the vulnerability is actively exploited is low at the time of this analysis, and the issue is not listed in the CISA KEV catalog. The likely attack vector involves a malicious user interacting with the plugin’s wishlist functionality, sending specially crafted payloads that bypass input validation and execute arbitrary SQL through the backend database. The impact is confined to the application’s database and the content accessible to attackers who can exploit it.

Generated by OpenCVE AI on May 1, 2026 at 03:46 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update MC Woocommerce Wishlist to a version later than 1.8.9
  • Implement input validation or escape mechanisms to protect SQL queries from unsanitized data
  • Deploy a web application firewall that blocks common SQL injection patterns and limit database privileges for the WordPress application user

Generated by OpenCVE AI on May 1, 2026 at 03:46 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8317 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in moreconvert MC Woocommerce Wishlist allows SQL Injection. This issue affects MC Woocommerce Wishlist: from n/a through 1.8.9.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in moreconvert MC Woocommerce Wishlist allows SQL Injection. This issue affects MC Woocommerce Wishlist: from n/a through 1.8.9. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Moreconvert Team MC Woocommerce Wishlist smart-wishlist-for-more-convert allows SQL Injection.This issue affects MC Woocommerce Wishlist: from n/a through <= 1.8.9.
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L'}


Thu, 27 Mar 2025 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 27 Mar 2025 11:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in moreconvert MC Woocommerce Wishlist allows SQL Injection. This issue affects MC Woocommerce Wishlist: from n/a through 1.8.9.
Title WordPress MC Woocommerce Wishlist plugin <= 1.8.9 - SQL Injection vulnerability
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:59.576Z

Reserved: 2025-03-26T09:21:15.800Z

Link: CVE-2025-30879

cve-icon Vulnrichment

Updated: 2025-03-27T13:11:03.529Z

cve-icon NVD

Status : Deferred

Published: 2025-03-27T11:15:48.940

Modified: 2026-04-23T15:27:15.013

Link: CVE-2025-30879

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-01T04:00:06Z

Weaknesses