Description
The B1.lt plugin for WordPress is vulnerable to SQL Injection due to a missing capability check on the b1_run_query AJAX action in all versions up to, and including, 2.2.57. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute and run arbitrary SQL commands.
Published: 2025-07-18
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: Database compromise
Action: Update plugin
AI Analysis

Impact

An authenticated subscriber can trigger the b1_run_query AJAX action that lacks a proper capability check. The flaw allows the attacker to inject and execute arbitrary SQL statements. This can lead to the disclosure of sensitive data, unauthorized modification or deletion of database contents, and potentially compromise the integrity and confidentiality of the entire site.

Affected Systems

The vulnerability affects the B1.lt plugin for WordPress, integrated with WooCommerce and sold by b1accounting:Site.pro. Versions 2.2.57 and earlier are impacted. Site owners running those versions should check the installed version and plan to upgrade.

Risk and Exploitability

The CVSS score of 8.8 reflects a high severity. EPSS indicates a very low current exploitation probability, and the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires a user with at least Subscriber-level access, which is normally granted to regular customers. Once authenticated, the attacker can dispatch the vulnerable AJAX endpoint and supply malicious SQL payloads. The lack of authorization control (CWE-862) is the root cause.

Generated by OpenCVE AI on April 21, 2026 at 03:59 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the B1.lt plugin to the latest released version that removes the missing capability check.
  • If immediate update is not possible, limit access to the b1_run_query AJAX action to administrator users by adding a capability check or disabling the endpoint for lower roles.
  • Verify that default Subscriber accounts cannot execute arbitrary SQL commands; review site roles and permissions and consider removing the Subscriber role from users who should not have database access.

Generated by OpenCVE AI on April 21, 2026 at 03:59 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-21854 The B1.lt plugin for WordPress is vulnerable to SQL Injection due to a missing capability check on the b1_run_query AJAX action in all versions up to, and including, 2.2.56. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute and run arbitrary SQL commands.
History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description The B1.lt plugin for WordPress is vulnerable to SQL Injection due to a missing capability check on the b1_run_query AJAX action in all versions up to, and including, 2.2.56. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute and run arbitrary SQL commands. The B1.lt plugin for WordPress is vulnerable to SQL Injection due to a missing capability check on the b1_run_query AJAX action in all versions up to, and including, 2.2.57. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute and run arbitrary SQL commands.
Title B1.lt for WooCommerce <= 2.2.56 - Missing Authorization to Authenticated (Subscriber+) Arbitrary SQL Injection B1.lt for WooCommerce <= 2.2.57 - Missing Authorization to Authenticated (Subscriber+) Arbitrary SQL Injection
References

Fri, 18 Jul 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 18 Jul 2025 05:30:00 +0000

Type Values Removed Values Added
Description The B1.lt plugin for WordPress is vulnerable to SQL Injection due to a missing capability check on the b1_run_query AJAX action in all versions up to, and including, 2.2.56. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute and run arbitrary SQL commands.
Title B1.lt for WooCommerce <= 2.2.56 - Missing Authorization to Authenticated (Subscriber+) Arbitrary SQL Injection
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:51:42.471Z

Reserved: 2025-06-26T13:40:59.684Z

Link: CVE-2025-6718

cve-icon Vulnrichment

Updated: 2025-07-18T14:54:28.442Z

cve-icon NVD

Status : Deferred

Published: 2025-07-18T06:15:27.453

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-6718

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T04:00:10Z

Weaknesses