Impact
Koko Analytics exposes a classic SQL injection (CWE-89) by storing unescaped tracking data and regurgitating it into SQL INSERT statements during export. Attacker‑controlled path or referrer values can break out of the value list, and when an administrator imports that export, the plugin executes the injected payload against the WordPress database without validation. The result is arbitrary SQL execution, which can delete core tables, inject backdoor admin accounts, or perform other destructive actions.
Affected Systems
All installations of IBERICODE Koko Analytics for WordPress that are running a version older than 2.1.3 are affected. Vulnerability exists in the tracking endpoint, export routine, and import handler. The plugin must be active on a WordPress site for the flaw to be relevant.
Risk and Exploitability
The CVSS score of 8.4 reflects a high‑severity data‑destructive flaw, while the EPSS score of less than 1% indicates that exploitation is currently uncommon. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves an unauthenticated attacker submitting malicious tracking data, followed by an authenticated administrator importing the crafted export file; alternatively, any authenticated user with the manage_koko_analytics capability can upload a malicious SQL file directly and have it executed.
OpenCVE Enrichment