Impact
The vulnerability is an improper neutralization of special elements used in an SQL command, allowing an attacker to perform blind SQL injection against the Captivate Sync plugin. An attacker who can craft and submit malicious input to affected plugin endpoints could retrieve, modify, or delete data stored in the plugin’s database, potentially exposing sensitive information or disrupting the WordPress site’s functionality.
Affected Systems
The vulnerable versions are all releases of the Captivate Sync plugin from captivateaudio up to and including 3.2.2. Any WordPress installation using these plugin versions is affected.
Risk and Exploitability
This flaw has a CVSS score of 7.6, indicating high severity, but the EPSS score is below 1%, suggesting a low current exploitation probability. The issue has not yet been listed in CISA’s Known Exploited Vulnerabilities catalog. Based on the description, it is inferred that the attack vector is remote via the plugin’s exposed input handling mechanisms, possibly requiring the ability to send crafted HTTP requests to the WordPress site.
OpenCVE Enrichment