Impact
The vulnerability exists in the JetEngine plugin for WordPress, affecting all releases up to and including 3.8.6.1. It is triggered through the listing_load_more AJAX action when the filtered_query parameter is not included in the HMAC signature validation. Because the prepare_where_clause() method fails to sanitize the compare operator, attackers can inject arbitrary SQL statements. The result is unauthenticated extraction of database contents, exposing sensitive data owned by the WordPress site.
Affected Systems
WordPress sites that have the Crocoblock JetEngine plugin installed with a Listing Grid having the Load More feature enabled. Any version of JetEngine 3.8.6.1 or earlier is vulnerable, regardless of the WordPress core version.
Risk and Exploitability
The CVSS score of 7.5 indicates a high severity, and while an EPSS score is not reported, the lack of authentication requirement makes exploitation straightforward for attackers who can reach the affected URL. The vulnerability is not listed in the CISA KEV catalog, but the discovered exploit opportunities and the widespread usage of JetEngine suggest a significant risk profile.
OpenCVE Enrichment