Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows SQL Injection.This issue affects JS Archive List: from n/a through < 6.1.6.
Published: 2025-08-20
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an SQL injection flaw in Miguel Useche’s JS Archive List WordPress plugin. Improper handling of user input results in unsanitized data being concatenated into SQL statements, enabling attackers to read, modify, or delete database contents. The potential impact includes loss of confidentiality and integrity of site data, as well as possible lateral movement if the database holds additional sensitive information.

Affected Systems

All WordPress installations that have the JS Archive List plugin at a version older than 6.1.6 are affected, as the plugin is supplied by Miguel Useche and the issue exists from the earliest release through any version before 6.1.6.

Risk and Exploitability

The CVSS score of 9.3 marks this issue as critical; the EPSS score of less than 1% indicates a low but non‑zero likelihood of exploitation. It is not listed in CISA’s KEV catalog, suggesting no large‑scale documented attacks. Based on the description, it is inferred that attackers can reach the flaw by sending malicious parameters in web requests to the plugin’s endpoints, and no special local privileges are required; the vulnerability can be exploited remotely through the browser or any entity that can submit data to the post requests that the plugin handles.

Generated by OpenCVE AI on April 30, 2026 at 08:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the JS Archive List plugin to version 6.1.6 or later; this is the official fix.
  • If an upgrade cannot be performed immediately, uninstall or disable the plugin to eliminate the vulnerable code path.
  • Implement rigorous input sanitization for any remaining plugin routes or replace the plugin with a secure alternative that uses prepared statements.
  • Consider deploying a Web Application Firewall rule set to detect and block SQL injection patterns targeting WordPress plugin inputs.

Generated by OpenCVE AI on April 30, 2026 at 08:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-28565 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Miguel Useche JS Archive List allows SQL Injection. This issue affects JS Archive List: from n/a through n/a.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Miguel Useche JS Archive List allows SQL Injection. This issue affects JS Archive List: from n/a through n/a. Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Miguel Useche JS Archive List jquery-archive-list-widget allows SQL Injection.This issue affects JS Archive List: from n/a through < 6.1.6.
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}


Wed, 20 Aug 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 20 Aug 2025 08:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Miguel Useche JS Archive List allows SQL Injection. This issue affects JS Archive List: from n/a through n/a.
Title WordPress JS Archive List Plugin < 6.1.6 - SQL Injection Vulnerability
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:36.451Z

Reserved: 2025-07-28T10:56:24.797Z

Link: CVE-2025-54726

cve-icon Vulnrichment

Updated: 2025-08-20T13:56:46.473Z

cve-icon NVD

Status : Deferred

Published: 2025-08-20T08:15:49.400

Modified: 2026-04-23T15:32:53.580

Link: CVE-2025-54726

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T09:00:19Z

Weaknesses