Description
The GeekyBot — Generate AI Content Without Prompt, Chatbot and Lead Generation plugin for WordPress is vulnerable to SQL Injection via the 'attributekey' parameter in versions up to, and including, 1.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-05-05
Score: 7.5 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The GeekyBot plugin for WordPress contains an unauthenticated SQL injection flaw in the 'attributekey' parameter. Because the input is not properly escaped or prepared, an attacker can inject arbitrary SQL statements. This flaw can be used to read sensitive information from the WordPress database, potentially exposing user data or site configuration. The vulnerability does not provide code‑execution capabilities but allows an attacker to obtain, tamper with, or delete database contents.

Affected Systems

The vulnerability affects the GeekyBot — AI Copilot, Chatbot, WooCommerce Lead Gen & Zero‑Prompt Content plugin, versions 1.2.0 and earlier, on any WordPress site that has the plugin installed and active. Sites running these versions are susceptible regardless of user role or network location.

Risk and Exploitability

The CVSS score of 7.5 signals a high‑impact issue. The lack of authentication and the straightforward injection path mean the flaw is readily exploitable from any external host. Although the EPSS score is not available and the vulnerability is not listed in CISA's KEV catalog, the potential for data disclosure makes it a priority for operators, especially sites that store sensitive customer or business data.

Generated by OpenCVE AI on May 5, 2026 at 05:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest plugin release that addresses the vulnerability, or upgrade to a version later than 1.2.0 if available.
  • If an update is not possible, remove or disable the GeekyBot plugin entirely to eliminate the attack surface.
  • Configure a web application firewall or similar security layer to detect and block SQL injection payloads targeting the 'attributekey' parameter.
  • Implement stricter input validation or sanitization for the 'attributekey' field if a custom patch is applied.

Generated by OpenCVE AI on May 5, 2026 at 05:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 05 May 2026 04:00:00 +0000

Type Values Removed Values Added
Description The GeekyBot — Generate AI Content Without Prompt, Chatbot and Lead Generation plugin for WordPress is vulnerable to SQL Injection via the 'attributekey' parameter in versions up to, and including, 1.2.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title GeekyBot — Generate AI Content Without Prompt, Chatbot and Lead Generation <= 1.2.0 - Unauthenticated SQL Injection via 'attributekey'
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-05T03:37:36.890Z

Reserved: 2026-03-02T18:58:06.506Z

Link: CVE-2026-3456

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-05T04:16:16.790

Modified: 2026-05-05T04:16:16.790

Link: CVE-2026-3456

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-05T06:00:10Z

Weaknesses