Impact
The vulnerability is a classic SQL Injection flaw, stemming from improper neutralization of special elements used in SQL commands. An attacker could inject crafted data that is then executed by the database. This may lead to disclosure, modification, or deletion of sensitive data stored by the WordPress installation, effectively granting the attacker control over the site's data integrity and availability.
Affected Systems
The affected component is the WordPress plugin 'WP Links Page' developed by Rico Macchi. All installations of versions from the earliest released through 4.9.6 are vulnerable. Sites running WordPress with this plugin should verify and address the issue.
Risk and Exploitability
The CVSS score is 8.5, indicating high severity. The EPSS score of less than 1% suggests a low current probability of exploitation, and the vulnerability is not currently listed in the CISA KEV catalog. Based on the nature of SQL injection, the likely attack vector involves sending a specially crafted request to the plugin's input endpoint, potentially through public-facing URLs. Full exploitation would require the ability to inject into the database via the plugin interface, which may not be restricted to authorized users based on the provided data.
OpenCVE Enrichment
EUVD