Impact
The JS Archive List plugin for WordPress contains a time‑based SQL injection flaw in the build_sql_where() function. The function fails to escape or prepare the user‑supplied parameter, allowing an unauthenticated attacker to append arbitrary SQL statements to the existing query. This can result in the disclosure of sensitive data from the database and potential further manipulation of database contents.
Affected Systems
All installations of the WordPress JS Archive List plugin from skatox, up to and including version 6.1.5, are affected. Any site using this plugin will be at risk if the current version is deployed.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity of the vulnerability. The EPSS score of less than 1% suggests a low probability of exploitation in the wild, and the condition that it is not listed in the CISA KEV catalog further reduces the perceived threat. Nonetheless, because the flaw is exploitable by unauthenticated users via simple web requests, the risk remains tangible for any exposed installation. An attacker can construct time‑based SQL queries to confirm injection success and extract data from the database.
OpenCVE Enrichment
EUVD