Description
The Fonts Manager | Custom Fonts plugin for WordPress is vulnerable to time-based SQL Injection via the ‘fmcfIdSelectedFnt’ parameter in all versions up to, and including, 1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-03-21
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Data Exfiltration via unauthenticated SQL injection
Action: Immediate Patch
AI Analysis

Impact

The Fonts Manager | Custom Fonts plugin for WordPress is vulnerable to a time‑based SQL injection through the fmcfIdSelectedFnt parameter, allowing an attacker to inject arbitrary SQL statements. This weakness is based on insufficient input escaping and lack of prepared statements. The primary impact is the ability to read sensitive information from the database, leading to potential data compromise. The vulnerability is identified as CWE‑89.

Affected Systems

WordPress sites running the Fonts Manager | Custom Fonts plugin by wisdomlogix, versions up to and including 1.2, are affected. No later version is specified as a fix in the available data. Site administrators should check the plugin version and remove or update the plugin if the version is within the vulnerable range.

Risk and Exploitability

The CVSS score of 7.5 indicates a high-impact vulnerability. The EPSS score is not provided, and the vulnerability is not listed in the CISA KEV catalog, implying it has not yet been exploited in the wild. The attack vector is unauthenticated, meaning any web visitor can exploit the flaw. If successfully exploited, the attacker can retrieve confidential database contents without authentication, posing a significant threat to data confidentiality.

Generated by OpenCVE AI on March 21, 2026 at 06:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Fonts Manager | Custom Fonts plugin to a version newer than 1.2
  • If update is not possible, uninstall or disable the plugin
  • Verify that no unexpected access to the fmcfIdSelectedFnt parameter remains
  • Maintain regular updates for WordPress core and all plugins

Generated by OpenCVE AI on March 21, 2026 at 06:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 23 Mar 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 23 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Wisdomlogix
Wisdomlogix fonts Manager | Custom Fonts
Wordpress
Wordpress wordpress
Vendors & Products Wisdomlogix
Wisdomlogix fonts Manager | Custom Fonts
Wordpress
Wordpress wordpress

Sat, 21 Mar 2026 05:30:00 +0000

Type Values Removed Values Added
Description The Fonts Manager | Custom Fonts plugin for WordPress is vulnerable to time-based SQL Injection via the ‘fmcfIdSelectedFnt’ parameter in all versions up to, and including, 1.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Fonts Manager | Custom Fonts <= 1.2 - Unauthenticated SQL Injection via fmcfIdSelectedFnt parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Wisdomlogix Fonts Manager | Custom Fonts
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:34:37.372Z

Reserved: 2026-02-03T11:15:34.051Z

Link: CVE-2026-1800

cve-icon Vulnrichment

Updated: 2026-03-23T18:20:50.547Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-21T04:16:54.520

Modified: 2026-03-23T14:32:02.800

Link: CVE-2026-1800

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-25T14:42:39Z

Weaknesses