Impact
Yoren Chang Media Search Enhanced plugin versions up to 0.9.1 contain an SQL Injection flaw caused by improper sanitization of special elements in SQL statements. This weakness allows an attacker to craft input that is inserted directly into database queries, potentially permitting extraction of sensitive database contents, modification of data, or escalation of privileges. The vulnerability is classified as CWE‑89, indicating that erroneous handling of user‑supplied data in SQL operations directly undermines confidentiality and integrity.
Affected Systems
The affected products are the Media Search Enhanced plugin developed by Yoren Chang, versions from the initial release through 0.9.1 inclusive. Users running any of these versions on WordPress sites are vulnerable, regardless of theme or other plugins installed.
Risk and Exploitability
The CVSS score of 7.6 denotes a high severity and the EPSS score of less than 1% suggests that, while exploitation is technically possible, current observed exploitation activity is low. The vulnerability is not currently listed in the CISA KEV catalog. Attacks would most likely occur over the public internet by submitting crafted search queries through the plugin’s interface; the plugin does not enforce authentication or input validation, so unauthenticated users could exploit the flaw.
OpenCVE Enrichment