Description
The OttoKit: All-in-One Automation Platform WordPress plugin before 1.1.23 does not properly sanitize user input before using it in a SQL statement, which could allow unauthenticated attackers to perform SQL injection attacks.
Published: 2026-05-08
Score: n/a
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The OttoKit All‑In‑One Automation Platform WordPress plugin fails to sanitize user input before incorporating it into a SQL statement. This flaw permits unauthenticated attackers to inject arbitrary SQL code. The impact is the potential compromise of confidential data, unauthorized data manipulation, and possible escalation to further system compromise.

Affected Systems

All installations of the OttoKit All‑In‑One Automation Platform WordPress plugin with a version earlier than 1.1.23 are affected. The vulnerability applies to the plugin’s components that handle user‑supplied data via their web interface.

Risk and Exploitability

The vulnerability is exploitable without authentication through any publicly reachable endpoint of the plugin. No EPSS score is available and the issue is not listed in the CISA KEV catalog, indicating a lower profile but still actionable risk. The lack of a public exploit does not negate the severity; attackers can craft payloads to read or manipulate database contents. The CVSS score is unspecified, but the nature of the flaw and lack of mitigations suggest a high severity. The attack vector is likely through web requests to the plugin’s exposed endpoints, and success requires only the ability to send arbitrary input to those endpoints.

Generated by OpenCVE AI on May 8, 2026 at 07:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the OttoKit All‑In‑One Automation Platform WordPress plugin to version 1.1.23 or later to apply the vendor’s fix.
  • If an immediate update is unavailable, restrict external access to the plugin’s request handling endpoint, for example by IP whitelisting or disabling the plugin until the upgrade can be performed.
  • Apply input validation and use prepared statements for any custom code that interacts with the database in the context of the affected plugin to prevent similar injection vulnerabilities.

Generated by OpenCVE AI on May 8, 2026 at 07:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 08 May 2026 07:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-89

Fri, 08 May 2026 06:30:00 +0000

Type Values Removed Values Added
Description The OttoKit: All-in-One Automation Platform WordPress plugin before 1.1.23 does not properly sanitize user input before using it in a SQL statement, which could allow unauthenticated attackers to perform SQL injection attacks.
Title SureTriggers < 1.1.23 – Unauthenticated SQLi
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-05-08T13:50:39.786Z

Reserved: 2026-03-26T20:00:09.059Z

Link: CVE-2026-4935

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-08T07:16:29.327

Modified: 2026-05-08T07:16:29.327

Link: CVE-2026-4935

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-08T07:30:03Z

Weaknesses