Impact
The vulnerable plugin contains an improper neutralization of special elements used in an SQL command, which allows SQL injection. Based on the description, it is inferred that an attacker who exploits this flaw could read, modify, or delete data stored by the WooCommerce platform. This could expose user credentials, order information, and other sensitive business data, potentially leading to full database compromise.
Affected Systems
The affected component is Printcart Web to Print Product Designer for WooCommerce released by Printcart. Versions from the earliest available up to and including 2.4.0 are vulnerable. Any WordPress site that has installed this plugin, regardless of site size or hosting environment, is at risk until the plugin is upgraded beyond the stated version.
Risk and Exploitability
The CVSS score of 9.3 indicates a critical impact, while the EPSS score of less than 1% suggests that, so far, public exploitation is unlikely. The flaw is exposed through the web interface and is not limited by user credentials, making it a straightforward attack vector for an adversary with network access to the site. The vulnerability is not listed in the CISA KEV catalog, but the high severity and wide exposure warrant proactive mitigation.
OpenCVE Enrichment
EUVD