Impact
The affected WordPress plugin processes the 'woo-superb-slideshow' shortcode with a parameter that is not properly escaped, creating an SQL injection vector. Exposing this flaw allows authenticated users with Contributor+ privileges to append arbitrary SQL statements to the existing database query. The attacker could exfiltrate sensitive data from the WordPress database, compromising confidentiality without affecting availability.
Affected Systems
WordPress users running the gopiplus Woo superb slideshow transition gallery with random effect plugin in versions 9.1 and earlier are affected. The vulnerability exists in all releases up to and including 9.1, regardless of package/installation method.
Risk and Exploitability
With a CVSS score of 6.5, this vulnerability carries a moderate severity. The EPSS score of less than 1% indicates a low likelihood of exploitation in the wild, and the issue is not listed in the CISA KEV catalog. Nevertheless, because the payload requires only Contributor+ level access, an attacker who gains or already possesses such privileges could exploit the flaw, and the injection could be performed from within the WordPress administration interface.
OpenCVE Enrichment
EUVD