Description
The My Sticky Bar plugin for WordPress is vulnerable to SQL injection via the `stickymenu_contact_lead_form` AJAX action in all versions up to, and including, 2.8.6. This is due to the handler using attacker-controlled POST parameter names directly as SQL column identifiers in `$wpdb->insert()`. While parameter values are sanitized with `esc_sql()` and `sanitize_text_field()`, the parameter keys are used as-is to build the column list in the INSERT statement. This makes it possible for unauthenticated attackers to inject SQL via crafted parameter names, enabling blind time-based data extraction from the database.
Published: 2026-03-12
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: SQL Injection leading to data compromise
Action: Immediate Patch
AI Analysis

Impact

The My Sticky Bar WordPress plugin allows unauthenticated users to perform a blind time‑based SQL injection via the stickymenu_contact_lead_form AJAX action. Attackers craft POST parameter names that are used directly as column identifiers in a SQL INSERT statement, bypassing parameter sanitization. Because the attacker‑controlled keys become part of the SQL, they can manipulate the query to exfiltrate data or potentially modify the database. This vulnerability provides a high‑impact data exposure vector rooted in CWE‑89.

Affected Systems

The vulnerability affects the Premio My Sticky Bar plugin (formerly myStickymenu) in all releases up to and including version 2.8.6. Any WordPress installation utilizing these plugin versions is potentially exposed, regardless of user privileges, because the vulnerable AJAX endpoint can be accessed without authentication.

Risk and Exploitability

The CVSS score is 7.5, indicating a high severity, while the EPSS score is below 1 % and the flaw is not listed in CISA’s KEV catalog, suggesting current exploitation risk is low but not negligible. Exploitation requires the target to be running the vulnerable plugin with the stickymenu_contact_lead_form action enabled, and the attacker must send a crafted HTTP POST request. Although the attack vector is remote and unauthenticated, the potential impact of data exposure or unauthorized database manipulation makes this a high‑risk issue.

Generated by OpenCVE AI on March 18, 2026 at 15:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the My Sticky Bar plugin to version 2.8.7 or later, which excludes the vulnerable code.
  • Verify that the stickymenu_contact_lead_form AJAX action is no longer available or has been patched after the update.
  • If an immediate upgrade is not feasible, block access to the AJAX endpoint via server configuration (e.g., .htaccess or firewall rules) to prevent unauthenticated POST requests.
  • Monitor the plugin’s official support channels for additional patches or advisories and apply them as soon as available.

Generated by OpenCVE AI on March 18, 2026 at 15:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 13 Mar 2026 10:00:00 +0000

Type Values Removed Values Added
First Time appeared Premio
Premio my Sticky Bar – Floating Notification Bar & Sticky Header (formerly Mystickymenu)
Wordpress
Wordpress wordpress
Vendors & Products Premio
Premio my Sticky Bar – Floating Notification Bar & Sticky Header (formerly Mystickymenu)
Wordpress
Wordpress wordpress

Thu, 12 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 12 Mar 2026 03:00:00 +0000

Type Values Removed Values Added
Description The My Sticky Bar plugin for WordPress is vulnerable to SQL injection via the `stickymenu_contact_lead_form` AJAX action in all versions up to, and including, 2.8.6. This is due to the handler using attacker-controlled POST parameter names directly as SQL column identifiers in `$wpdb->insert()`. While parameter values are sanitized with `esc_sql()` and `sanitize_text_field()`, the parameter keys are used as-is to build the column list in the INSERT statement. This makes it possible for unauthenticated attackers to inject SQL via crafted parameter names, enabling blind time-based data extraction from the database.
Title My Sticky Bar <= 2.8.6 - Unauthenticated SQL Injection via 'stickymenu_contact_lead_form' Action
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Premio My Sticky Bar – Floating Notification Bar & Sticky Header (formerly Mystickymenu)
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-03-12T13:14:24.099Z

Reserved: 2026-03-06T18:19:56.674Z

Link: CVE-2026-3657

cve-icon Vulnrichment

Updated: 2026-03-12T13:14:20.302Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-12T03:15:57.923

Modified: 2026-03-12T21:07:53.427

Link: CVE-2026-3657

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T15:36:11Z

Weaknesses