Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tribulant Software Newsletters newsletters-lite allows SQL Injection.This issue affects Newsletters: from n/a through <= 4.9.9.7.
Published: 2025-03-27
Score: 7.6 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WordPress Newsletters Lite plugin contains a flaw where user input is not properly sanitized before being embedded in an SQL query. This vulnerability, identified as CWE‑89, allows an attacker to inject arbitrary SQL statements into the database. If successfully exploited, the attacker could potentially execute commands that read, modify, or delete data in the WordPress database, thereby affecting confidentiality, integrity, and availability of the site.

Affected Systems

Tribulant Software Newsletters Lite plugin versions from the first release up to and including 4.9.9.7 are affected. The disclosure does not specify a lower bound, so all earlier releases should also be treated as vulnerable. The vulnerability exists in the plugin code that processes RSS feeds and mailing list subscription requests.

Risk and Exploitability

The CVSS base score of 7.6 indicates a high‑severity flaw. The EPSS score of less than 1% suggests that the likelihood of exploitation in the current environment is low, and the issue is not listed in the CISA KEV catalogue. The likely attack vector is remote via HTTP requests to the plugin’s exposed endpoints; no additional privileged access is required to exploit the code.

Generated by OpenCVE AI on May 2, 2026 at 03:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Newsletters Lite plugin to version 4.9.9.8 or newer.
  • If an upgrade cannot be performed immediately, temporarily disable the plugin to eliminate the vulnerable functionality.
  • Apply a web application firewall rule or intrusion prevention system to block suspicious SQL payloads targeting the plugin’s endpoints.

Generated by OpenCVE AI on May 2, 2026 at 03:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-8296 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tribulant Software Newsletters allows SQL Injection. This issue affects Newsletters: from n/a through 4.9.9.7.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tribulant Software Newsletters allows SQL Injection. This issue affects Newsletters: from n/a through 4.9.9.7. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tribulant Software Newsletters newsletters-lite allows SQL Injection.This issue affects Newsletters: from n/a through <= 4.9.9.7.
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L'}


Thu, 27 Mar 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 27 Mar 2025 11:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Tribulant Software Newsletters allows SQL Injection. This issue affects Newsletters: from n/a through 4.9.9.7.
Title WordPress Newsletters plugin <= 4.9.9.7 - SQL Injection vulnerability
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:12:00.912Z

Reserved: 2025-03-26T09:21:45.625Z

Link: CVE-2025-30921

cve-icon Vulnrichment

Updated: 2025-03-27T14:13:14.600Z

cve-icon NVD

Status : Deferred

Published: 2025-03-27T11:15:52.770

Modified: 2026-04-23T15:27:19.843

Link: CVE-2025-30921

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T03:15:06Z

Weaknesses