Impact
This vulnerability is an improper neutralization of special elements used in an SQL command, classified as SQL injection (CWE-89). An attacker can craft input that the LifterLMS plugin processes without proper sanitization, leading to execution of arbitrary SQL statements against the WordPress database. This enables the attacker to read, alter, or delete application data, potentially compromising the confidentiality and integrity of the site’s content and user information.
Affected Systems
The vulnerability affects the WordPress LifterLMS plugin developed by chrisbadgett. Any installation of LifterLMS version 8.0.6 or earlier is potentially exploitable. Users running these versions should verify their installed version and consider an upgrade if available.
Risk and Exploitability
The CVSS score of 9.3 indicates a high severity risk. The EPSS score of less than 1% suggests that exploitation is currently rare, and the vulnerability is not listed in CISA’s KEV catalog. The likely attack vector is remote, via the web interface of the plugin, as the injection point is reachable through user-supplied input in the plugin’s functionality. Consequently, administrators should treat this as a potentially high‑impact issue, chiefly concerned with data confidentiality and integrity.
OpenCVE Enrichment
EUVD