Description
The Geo Mashup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'geo_mashup_null_fields' parameter in all versions up to, and including, 1.13.19 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Published: 2026-05-02
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Geo Mashup WordPress plugin accepts the geo_mashup_null_fields parameter without proper escaping, enabling a time-based blind SQL injection that lets an attacker append and execute arbitrary SQL queries. This flaw can be exploited by authenticated users with subscriber-level access or higher to extract sensitive information from the WordPress database.

Affected Systems

The vulnerability affects the Geo Mashup plugin supplied by cyberhobo for WordPress. All released versions up to and including 1.13.19 are impacted. Users running the plugin on their sites must check their version and upgrade if necessary.

Risk and Exploitability

The CVSS score of 6.5 indicates moderate to high severity. The EPSS score is not available and the vulnerability is not listed in CISA’s KEV catalog, so no documented exploitation is known. The attack vector is authenticated, requiring a subscriber‑level account or higher, and the threat is the ability to inject and execute additional SQL statements to read sensitive data from the database.

Generated by OpenCVE AI on May 2, 2026 at 09:56 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Geo Mashup plugin to a version newer than 1.13.19; the latest release removes the vulnerable parameter handling.
  • Restrict subscriber accounts that have access to the plugin’s admin interface until an update is available, or enforce stricter authentication controls.
  • Monitor database logs for anomalous query patterns that may indicate injection attempts, and implement application‑level logging or WAF rules to detect suspicious activity.

Generated by OpenCVE AI on May 2, 2026 at 09:56 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Cyberhobo
Cyberhobo geo Mashup
Wordpress
Wordpress wordpress
Vendors & Products Cyberhobo
Cyberhobo geo Mashup
Wordpress
Wordpress wordpress

Sat, 02 May 2026 08:00:00 +0000

Type Values Removed Values Added
Description The Geo Mashup plugin for WordPress is vulnerable to time-based blind SQL Injection via the 'geo_mashup_null_fields' parameter in all versions up to, and including, 1.13.19 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for authenticated attackers, with subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Title Geo Mashup <= 1.13.19 - Authenticated (Subscriber+) SQL Injection via 'geo_mashup_null_fields' Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Cyberhobo Geo Mashup
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-02T07:46:41.352Z

Reserved: 2026-04-16T21:05:06.997Z

Link: CVE-2026-6457

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T08:16:27.803

Modified: 2026-05-02T08:16:27.803

Link: CVE-2026-6457

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T10:00:06Z

Weaknesses