Impact
An improperly neutralized input in the FooEvents for WooCommerce WordPress plugin permits attackers to inject arbitrary SQL commands. The flaw, classified as CWE‑89, can lead to unauthorized reading, modification, or deletion of database records. The vulnerability exists in all releases up to and including version 1.20.4.
Affected Systems
WordPress installations that use FooEvents for WooCommerce plugin version 1.20.4 or earlier are affected. Users should review the plugin version deployed on their sites and plan an upgrade if necessary.
Risk and Exploitability
The CVSS score of 8.5 indicates high severity, while the EPSS score of less than 1% suggests exploitation is currently uncommon. The vulnerability is not listed in CISA's KEV catalog. Attackers can exploit the flaw remotely by sending crafted HTTP requests containing malicious input to the plugin's endpoints, assuming no additional input validation is in place. Because the flaw resides in the plugin's database interaction layer, it does not require local code execution or elevated privileges to be triggered.
OpenCVE Enrichment