Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in levelfourdevelopment WP EasyCart wp-easycart allows Blind SQL Injection.This issue affects WP EasyCart: from n/a through <= 5.8.13.
Published: 2026-03-13
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection (Data Compromise)
Action: Patch Now
AI Analysis

Impact

This vulnerability is a blind SQL Injection in the WP EasyCart plugin due to improper neutralization of special elements in an SQL command. Attackers can insert crafted input that is executed by the database without error feedback, allowing them to read, modify, or delete data in the WordPress database, potentially leading to site compromise or data exfiltration.

Affected Systems

The vulnerability affects the levelfourdevelopment WP EasyCart plugin on WordPress sites. All releases from n/a through version 5.8.13 are impacted, so any installation using WP EasyCart 5.8.13 or earlier is at risk.

Risk and Exploitability

The CVSS score of 8.5 indicates high severity. The EPSS score of less than 1% suggests the probability of exploitation is low, and the vulnerability is not currently listed in the CISA KEV catalog. The likely attack vector is via web requests to the plugin’s input fields, where attackers can supply malicious payloads that are executed by the database in a blind manner. Successful exploitation would enable data access or modification.

Generated by OpenCVE AI on March 19, 2026 at 15:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WP EasyCart to a version newer than 5.8.13 if available.
  • Deactivate or uninstall the WP EasyCart plugin if no patch exists.
  • If the plugin is required, apply input validation or a web application firewall rule to block SQL injection patterns targeting the plugin’s endpoints.
  • Monitor your site for suspicious database activity and review logs for unauthorized queries.

Generated by OpenCVE AI on March 19, 2026 at 15:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Levelfourdevelopment
Levelfourdevelopment wp-easycart
Wordpress
Wordpress wordpress
Vendors & Products Levelfourdevelopment
Levelfourdevelopment wp-easycart
Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in levelfourdevelopment WP EasyCart wp-easycart allows Blind SQL Injection.This issue affects WP EasyCart: from n/a through <= 5.8.13.
Title WordPress WP EasyCart plugin <= 5.8.13 - SQL Injection vulnerability
Weaknesses CWE-89
References

Subscriptions

Levelfourdevelopment Wp-easycart
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:16:14.074Z

Reserved: 2026-03-12T11:11:26.570Z

Link: CVE-2026-32422

cve-icon Vulnrichment

Updated: 2026-03-13T18:04:53.099Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-13T19:55:00.090

Modified: 2026-03-16T14:53:46.157

Link: CVE-2026-32422

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T12:03:42Z

Weaknesses