Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in flycart UpsellWP checkout-upsell-and-order-bumps allows Blind SQL Injection.This issue affects UpsellWP: from n/a through <= 2.2.4.
Published: 2026-03-13
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote SQL Injection
Action: Immediate Patch
AI Analysis

Impact

An attacker can exploit the UpsellWP plugin version 2.2.4 or earlier by injecting malicious SQL statements into specially crafted input fields. This entry describes an improper neutralization of special elements in SQL queries, leading to blind SQL injection. The vulnerability is based on CWE‑89. Successful exploitation could allow the attacker to read, modify or delete data from the WordPress database, potentially compromising site content and user data. The impact covers confidentiality and integrity of database information, with a potential to affect the entire website if network access is limited only to the hosting environment.

Affected Systems

The plugin UpsellWP (checkout‑upsell-and-order‑bumps) by flycart is affected from the earliest available version through 2.2.4. WordPress installations running the plugin at any of those versions are vulnerable.

Risk and Exploitability

The vulnerability carries a CVSS v3.1 score of 8.5, indicating high severity. The EPSS score is below 1%, suggesting a low probability of observation in the past year, and the vulnerability is not listed in the CISA KEV catalog. The attack vector is likely remote through web input, but a specific path or preparatory conditions are not stated in the source data. As best practice, all clients should assume that the flaw could be exploited without authentication or with restricted privileges depending on the targeted database user.

Generated by OpenCVE AI on March 19, 2026 at 15:07 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade UpsellWP to version 2.2.5 or later.
  • If upgrade is not immediately possible, remove or disable the UpsellWP plugin from the WordPress installation until a patch is applied.
  • Review and sanitize all user‑supplied input that interacts with the database.

Generated by OpenCVE AI on March 19, 2026 at 15:07 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Flycart
Flycart upsellwp
Wordpress
Wordpress wordpress
Vendors & Products Flycart
Flycart upsellwp
Wordpress
Wordpress wordpress

Fri, 13 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 13 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L'}


Fri, 13 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in flycart UpsellWP checkout-upsell-and-order-bumps allows Blind SQL Injection.This issue affects UpsellWP: from n/a through <= 2.2.4.
Title WordPress UpsellWP plugin <= 2.2.4 - SQL Injection vulnerability
Weaknesses CWE-89
References

Subscriptions

Flycart Upsellwp
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-01T14:16:21.971Z

Reserved: 2026-03-12T11:11:45.408Z

Link: CVE-2026-32459

cve-icon Vulnrichment

Updated: 2026-03-13T19:29:43.929Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-13T19:55:08.247

Modified: 2026-03-16T14:53:46.157

Link: CVE-2026-32459

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T12:03:06Z

Weaknesses