Impact
The plugin contains a time‑based SQL injection flaw in the table_name parameter. Insufficient escaping combined with lack of prepared statements lets an editor or higher role append arbitrary SQL to existing queries, enabling extraction of sensitive database content.
Affected Systems
WordPress sites using the WP Online Users Stats plugin by hk1993, versions 1.0.0 and earlier.
Risk and Exploitability
The CVSS score of 4.9 reflects moderate severity, and the EPSS score of less than 1% indicates a very low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access with Editor privileges or higher, which is common on many WordPress installations. Once compromised, attackers can read arbitrary tables through the injected queries.
OpenCVE Enrichment
EUVD