Impact
The Product Filter for WooCommerce plugin before version 3.1.3 fails to sanitize a user-supplied parameter, enabling unauthenticated SQL injection. Attackers can inject arbitrary SQL, potentially retrieving, modifying, or deleting database contents, jeopardizing confidential data and site integrity.
Affected Systems
WordPress sites using the Product Filter for WooCommerce plugin by WBW with versions older than 3.1.3 are affected.
Risk and Exploitability
Because the vulnerability is unauthenticated and exploits a publicly accessible input, the attack vector is likely remote via HTTP requests. The exploitation does not require additional privileges; any site visitor can send the malicious payload. Without a CVSS or EPSS score, the risk assessment relies on the inherent severity of unauthenticated SQL injection, which is high. The vulnerability is not currently listed in CISA’s KEV catalog, but the potential for data breaches remains significant.
OpenCVE Enrichment