Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in delphiknight Geo to Lat geo-to-lat allows Blind SQL Injection.This issue affects Geo to Lat: from n/a through <= 1.0.19.
Published: 2026-03-13
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection (Blind)
Action: Immediate Patch
AI Analysis

Impact

The vulnerability exists in the WordPress Geo to Lat plugin and allows attackers to perform blind SQL injection through improper neutralization of special elements used in SQL commands (CWE-89). Enabling this flaw could let a remote attacker read, modify or delete sensitive database contents, leading to significant confidentiality and integrity compromise. The description emphasizes that the issue allows blind data extraction, indicating that the attacker can infer database contents via query responses rather than direct error messages, but can still achieve substantial data exposure.

Affected Systems

WordPress sites installing the delphiknight Geo to Lat plugin with versions up to and including 1.0.19 are affected. The vulnerability applies to any installation that has not yet upgraded beyond that version threshold.

Risk and Exploitability

The CVSS score of 8.5 indicates a high severity risk. EPSS score is below 1%, suggesting a low likelihood of exploitation in the current threat landscape, and the vulnerability is not listed in the CISA KEV catalog. The description reports a blind SQL injection, implying that an attacker can infer data from the database, but the exact attack vector (e.g., unauthenticated request, privileged user) is not explicitly stated, so it is inferred that exploitation may require access to the plugin’s input parameters and potentially site or database access. Overall, the risk remains high due to the potential for data compromise should an attacker successfully exploit the flaw.

Generated by OpenCVE AI on March 19, 2026 at 14:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the WordPress Geo to Lat plugin to a version newer than 1.0.19 as soon as possible.
  • If immediate upgrade is not feasible, temporarily disable or block the plugin to eliminate the attack surface.
  • Review any custom code that interacts with the plugin or its database queries to ensure proper input sanitization and parameterization.
  • Monitor database logs for unusual query patterns that may indicate attempts to exploit SQL injection vulnerabilities.

Generated by OpenCVE AI on March 19, 2026 at 14:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Delphiknight
Delphiknight geo To Lat
Wordpress
Wordpress wordpress
Vendors & Products Delphiknight
Delphiknight geo To Lat
Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L'}


Fri, 13 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in delphiknight Geo to Lat geo-to-lat allows Blind SQL Injection.This issue affects Geo to Lat: from n/a through <= 1.0.19.
Title WordPress Geo to Lat plugin <= 1.0.19 - SQL Injection vulnerability
Weaknesses CWE-89
References

Subscriptions

Delphiknight Geo To Lat
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:16:00.448Z

Reserved: 2026-03-12T11:10:59.411Z

Link: CVE-2026-32368

cve-icon Vulnrichment

Updated: 2026-03-13T19:29:37.910Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-13T19:54:51.027

Modified: 2026-03-16T14:53:46.157

Link: CVE-2026-32368

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T09:58:49Z

Weaknesses