Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in scriptsbundle Exertio Framework exertio-framework allows Blind SQL Injection.This issue affects Exertio Framework: from n/a through <= 1.3.3.
Published: 2025-08-28
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

Improper neutralization of special elements in SQL commands within the Exertio Framework plugin gives an attacker blind SQL Injection. The vulnerability allows the attacker to craft inputs that are directly embedded into database queries, potentially enabling unauthorized data extraction, modification, or deletion, thereby compromising confidentiality and integrity of the database.

Affected Systems

WordPress sites that have the Exertio Framework plugin installed on version 1.3.3 or earlier. All users managing those sites are at risk, regardless of the plugin’s role within the site’s functionality.

Risk and Exploitability

The CVSS score of 8.5 indicates high severity. The EPSS score of less than 1% suggests that the likelihood of exploitation is very low at present, and the vulnerability is not cataloged in CISA’s KEV list. The attack vector is inferred to be web‑based, requiring the attacker to send specially crafted requests to the plugin’s endpoints. Successful exploitation would confine the attacker to the scope of the web application and the database credentials used by WordPress, but could still lead to significant data exposure if the attacker can leverage the blind injection to infer database structure and contents.

Generated by OpenCVE AI on April 30, 2026 at 15:34 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Exertio Framework plugin to version 1.3.4 or later to remove the vulnerable code.
  • Take a full backup of the WordPress database before applying the update to preserve data integrity and enable quick recovery if needed.
  • After the update, run a vulnerability scan or perform manual testing to confirm the injection vector is closed, and monitor web server and database logs for any suspicious activity.

Generated by OpenCVE AI on April 30, 2026 at 15:34 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-26010 Missing Authorization vulnerability in favethemes Houzez CRM allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Houzez CRM: from n/a through 1.4.7.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in favethemes Houzez CRM allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Houzez CRM: from n/a through 1.4.7. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in scriptsbundle Exertio Framework exertio-framework allows Blind SQL Injection.This issue affects Exertio Framework: from n/a through <= 1.3.3.
Title WordPress Houzez CRM Plugin <= 1.4.7 - Broken Access Control Vulnerability WordPress Exertio Framework Plugin <= 1.3.3 - SQL Injection Vulnerability
Weaknesses CWE-862 CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Thu, 28 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 28 Aug 2025 13:00:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in favethemes Houzez CRM allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Houzez CRM: from n/a through 1.4.7.
Title WordPress Houzez CRM Plugin <= 1.4.7 - Broken Access Control Vulnerability
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:03.159Z

Reserved: 2025-06-04T15:44:03.663Z

Link: CVE-2025-49402

cve-icon Vulnrichment

Updated: 2025-08-28T15:24:35.121Z

cve-icon NVD

Status : Deferred

Published: 2025-08-28T13:15:59.623

Modified: 2026-04-23T15:31:37.083

Link: CVE-2025-49402

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T15:45:40Z

Weaknesses