Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TeconceTheme Electio Core electio-core allows Blind SQL Injection.This issue affects Electio Core: from n/a through <= 1.4.
Published: 2026-02-20
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Confidentiality & Integrity Compromise via Blind SQL Injection
Action: Immediate Patch
AI Analysis

Impact

The vulnerability originates from insufficient neutralization of user input when the Electio Core plugin constructs SQL statements. Classified as CWE‑89, the flaw permits attackers to inject arbitrary SQL code. The reported impact is a Blind SQL Injection that enables an observer to extract data from the WordPress database, thereby compromising the confidentiality and integrity of site data.

Affected Systems

The defect affects the TeconceTheme Electio Core plugin, version 1.4 and earlier. All WordPress sites that have this plugin installed—regardless of the WordPress core version—are exposed to the injection risk.

Risk and Exploitability

The CVSS score of 9.3 indicates a high severity assessment. The EPSS score of less than 1% suggests that exploitation is currently unlikely. The issue is not listed in the CISA KEV catalog. The description states the presence of a Blind SQL Injection but does not disclose whether authentication or a public endpoint is required to reach the vulnerable code; therefore the exact attack surface cannot be determined from the supplied data. If the injection can be triggered via a public web request, the risk is that an unauthenticated user could gather sensitive information from the database.

Generated by OpenCVE AI on April 28, 2026 at 17:39 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Electio Core plugin to a version newer than 1.4 to remove the injection vector.
  • If upgrading is not immediately possible, deactivate or uninstall the Electio Core plugin to block the vulnerable code.
  • Monitor web server logs for anomalous SQL queries or errors, and configure a web application firewall to block potential injection attempts.

Generated by OpenCVE AI on April 28, 2026 at 17:39 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 25 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 24 Feb 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 9.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L'}


Mon, 23 Feb 2026 15:00:00 +0000

Type Values Removed Values Added
First Time appeared Teconcetheme
Teconcetheme electio Core
Wordpress
Wordpress wordpress
Vendors & Products Teconcetheme
Teconcetheme electio Core
Wordpress
Wordpress wordpress

Fri, 20 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in TeconceTheme Electio Core electio-core allows Blind SQL Injection.This issue affects Electio Core: from n/a through <= 1.4.
Title WordPress Electio Core plugin <= 1.4 - SQL Injection vulnerability
Weaknesses CWE-89
References

Subscriptions

Teconcetheme Electio Core
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T20:47:12.777Z

Reserved: 2025-12-31T20:12:02.742Z

Link: CVE-2025-69306

cve-icon Vulnrichment

Updated: 2026-02-24T19:28:22.792Z

cve-icon NVD

Status : Deferred

Published: 2026-02-20T16:22:18.740

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-69306

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T17:45:16Z

Weaknesses