Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David Lingren Media LIbrary Assistant media-library-assistant allows Blind SQL Injection.This issue affects Media LIbrary Assistant: from n/a through <= 3.32.
Published: 2026-03-13
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection
Action: Disable Plugin
AI Analysis

Impact

The vulnerability is identified as an Improper Neutralization of Special Elements used in an SQL Command, commonly referred to as SQL injection. The plugin’s code does not sanitize user input before embedding it into SQL statements, allowing an attacker to execute arbitrary queries. Because the flaw is a blind SQL injection, the attacker can infer data by observing response timing or error messages, potentially extracting sensitive information or modifying database contents, thereby compromising confidentiality and integrity of the WordPress site.

Affected Systems

WordPress sites that have the Media Library Assistant plugin installed in any version up to and including 3.32 are affected. The vulnerability range is listed as from the initial release (unknown) through 3.32, with no later versions specified as safe.

Risk and Exploitability

The CVSS score of 8.5 indicates a high severity vulnerability. The EPSS score of less than 1% suggests that exploitation is currently considered unlikely, and the flaw is not listed in the CISA KEV catalog. The likely attack vector is via HTTP requests that interact with the plugin’s backend code; the vulnerable input can be supplied by both unauthenticated and authenticated users through the WordPress admin interface. Because the injection is blind, an attacker does not need to see error messages; observing timing differences is sufficient. No official patch or workaround is supplied in the CVE data, so the risk remains until a vendor fix is released or the plugin is removed.

Generated by OpenCVE AI on March 19, 2026 at 16:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Disable or uninstall the Media Library Assistant plugin to eliminate the risk.
  • Check the vendor’s website or the plugin’s repository for an update that addresses the SQL injection flaw.
  • If an official patch becomes available, apply it promptly to restore secure functionality.
  • Limit the database user privileges granted to the WordPress application to the minimum required for normal operation, reducing potential damage if the injection is exploited.

Generated by OpenCVE AI on March 19, 2026 at 16:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Davidlingren
Davidlingren media Library Assistant
Wordpress
Wordpress wordpress
Vendors & Products Davidlingren
Davidlingren media Library Assistant
Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L'}


Fri, 13 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in David Lingren Media LIbrary Assistant media-library-assistant allows Blind SQL Injection.This issue affects Media LIbrary Assistant: from n/a through <= 3.32.
Title WordPress Media LIbrary Assistant plugin <= 3.32 - SQL Injection vulnerability
Weaknesses CWE-89
References

Subscriptions

Davidlingren Media Library Assistant
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:16:09.153Z

Reserved: 2026-03-12T11:11:14.585Z

Link: CVE-2026-32399

cve-icon Vulnrichment

Updated: 2026-03-13T19:29:39.962Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-13T19:54:55.777

Modified: 2026-03-16T14:53:46.157

Link: CVE-2026-32399

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T12:04:02Z

Weaknesses