Description
The JetBooking plugin for WordPress is vulnerable to SQL Injection via the 'check_in_date' parameter in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-03-11
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Unrestricted database access via SQL injection
Action: Immediate Patch
AI Analysis

Impact

The JetBooking WordPress plugin is vulnerable to SQL Injection through the 'check_in_date' parameter in all versions up to 4.0.3. The vulnerability arises from insufficient input escaping and lack of prepared statements, allowing unauthenticated attackers to append arbitrary SQL code to the existing query. This can be exploited to retrieve sensitive data from the database, such as user credentials, booking details, or other confidential information.

Affected Systems

The affected product is the Crocoblock JetBooking plugin for WordPress. All installations running version 4.0.3 or earlier are impacted. No specific build numbers are listed beyond the upper bound of 4.0.3, so any build in that range should be considered vulnerable.

Risk and Exploitability

CVSS score 7.5 indicates a high severity with potential data exposure. EPSS score is below 1%, suggesting that exploitation is not currently widespread, and KEV catalog does not list it as a known exploited vulnerability. The attack vector is unauthenticated, so any user with access to the website’s query parameters could trigger the injection, making the risk high for exposed sites. The vulnerability requires no additional privileges, and could be used to extract arbitrary tables or data from the database.

Generated by OpenCVE AI on March 17, 2026 at 16:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Verify JetBooking plugin version; if 4.0.3 or earlier, schedule an update.
  • Upgrade JetBooking to the latest available version (4.0.4 or newer) from Crocoblock.
  • If an immediate upgrade is not possible, restrict the 'check_in_date' parameter to valid date ranges or filter input server‑side.
  • Monitor the database and application logs for suspicious SELECT or UNION queries that may indicate exploitation.
  • Check Crocoblock's changelog page or support forum for any announced mitigations or hotfixes beyond the official patch.

Generated by OpenCVE AI on March 17, 2026 at 16:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Crocoblock
Crocoblock jetbooking
Wordpress
Wordpress wordpress
Vendors & Products Crocoblock
Crocoblock jetbooking
Wordpress
Wordpress wordpress

Wed, 11 Mar 2026 13:45:00 +0000

Type Values Removed Values Added
Description The JetBooking plugin for WordPress is vulnerable to SQL Injection via the 'check_in_date' parameter in all versions up to, and including, 4.0.3. This is due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title JetBooking <= 4.0.3 - Unauthenticated SQL Injection via 'check_in_date' Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Crocoblock Jetbooking
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-03-11T14:44:20.430Z

Reserved: 2026-03-03T18:32:46.594Z

Link: CVE-2026-3496

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T14:16:28.980

Modified: 2026-03-12T21:08:22.643

Link: CVE-2026-3496

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:37:18Z

Weaknesses