Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Ninja Forms Views &#8211; Display &amp; Edit Ninja Forms Submissions on your site frontend views-for-ninja-forms allows Blind SQL Injection.This issue affects Ninja Forms Views &#8211; Display &amp; Edit Ninja Forms Submissions on your site frontend: from n/a through <= 3.3.2.
Published: 2026-05-12
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is an improper neutralization of special elements used in an SQL command, allowing blind SQL injection. An attacker can craft malicious inputs that bypass proper escaping and reach the database engine, potentially extracting, modifying, or deleting submission data stored by the plugin. This flaw is a classic injection weakness (CWE‑89) that undermines data integrity and confidentiality for sites using the affected plugin. The impact is confined to the database statements executed by the plugin and does not directly lead to arbitrary code execution, but it can allow an attacker to gain privileged access to sensitive user submissions.

Affected Systems

The flaw affects the WordPress plugin Aman Ninja Forms Views – Display & Edit Ninja Forms Submissions on your site frontend, versions from the initial release through any release up to and including 3.3.2. No further product or vendor names are explicitly enumerated beyond the plugin itself.

Risk and Exploitability

The CVSS score of 8.5 indicates high severity, and the EPSS score is not available, so the current estimate of exploitation probability is unknown. The vulnerability is not listed in CISA’s KEV catalog. The attack vector is inferred to be remote since the plugin processes data submitted via the frontend; an attacker can submit malicious payloads through exposed form fields to trigger the injection. No additional prerequisites are publicly documented, suggesting that the flaw can be exploited by anyone who can access the vulnerable form pages.

Generated by OpenCVE AI on May 12, 2026 at 13:21 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the plugin to a version newer than 3.3.2 to remove the SQL injection flaw.
  • Temporarily disable the plugin or remove the vulnerable form from your site to prevent new submissions until a patch can be applied.
  • Deploy a web‑application firewall rule to detect and block SQL injection attempts against the plugin’s endpoints as an interim safeguard.

Generated by OpenCVE AI on May 12, 2026 at 13:21 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 11:15:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Aman Ninja Forms Views &#8211; Display &amp; Edit Ninja Forms Submissions on your site frontend views-for-ninja-forms allows Blind SQL Injection.This issue affects Ninja Forms Views &#8211; Display &amp; Edit Ninja Forms Submissions on your site frontend: from n/a through <= 3.3.2.
Title WordPress Ninja Forms Views – Display & Edit Ninja Forms Submissions on your site frontend plugin <= 3.3.2 - SQL Injection vulnerability
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:L'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-05-12T21:13:31.727Z

Reserved: 2026-04-29T09:05:30.886Z

Link: CVE-2026-42741

cve-icon Vulnrichment

Updated: 2026-05-12T21:13:27.239Z

cve-icon NVD

Status : Deferred

Published: 2026-05-12T11:16:20.103

Modified: 2026-05-12T14:03:52.757

Link: CVE-2026-42741

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T13:30:16Z

Weaknesses