Impact
An improper neutralization of special elements within SQL commands in the xenioushk BWL Pro Voting Manager plugin allows blind SQL injection. This flaw enables an attacker to execute arbitrary SQL statements against the database, potentially exfiltrating sensitive data, modifying vote counts, or elevating privileges. The weakness is a classic SQL injection (CWE‑89) which compromises confidentiality and integrity of data stored by the WordPress site.
Affected Systems
The vulnerability affects the BWL Pro Voting Manager WordPress plugin from any version up to and including 1.4.9. WordPress sites that have installed or enabled the plugin are at risk, regardless of the WordPress core version.
Risk and Exploitability
The CVSS score is 8.5, indicating a high severity. The EPSS score is below 1%, suggesting a low probability of being targeted currently, and the vulnerability is not listed in the CISA KEV catalog. The likely attack path involves submitting crafted voting requests through the plugin’s public endpoints, as the input fields are not properly sanitized. Successful exploitation would require network access to the WordPress site but does not depend on privileged credentials.
OpenCVE Enrichment