CVE-2026-9065
Gravedad CVSS v4.0:
CRÍTICA
Tipo:
CWE-89
Neutralización incorrecta de elementos especiales usados en un comando SQL (Inyección SQL)
Fecha de publicación:
20/05/2026
Última modificación:
20/05/2026
Descripción
*** Pendiente de traducción *** SureCart version prior to 4.2.1 are vulnerable to authenticated SQL injection via multiple parameters (&#39;model_name&#39;, &#39;model_id&#39;, &#39;integration_id&#39;, &#39;provider&#39;) on the REST API endpoint &#39;/surecart/v1/integrations/{id}&#39;.<br />
<br />
The root cause is a flawed escaping bypass in the query builder (&#39;wp-query-builder&#39;). Values passed to the &#39;where()&#39; method are only sanitized via &#39;$wpdb->prepare()&#39; when they do **not** contain a dot (&#39;.&#39;) or the WordPress table prefix (&#39;wp_&#39;). By including a dot anywhere in the payload, an attacker completely bypasses the escaping logic and injects arbitrary SQL into the &#39;WHERE&#39; clause, allowing full UNION-based extraction of the database.
Impacto
Puntuación base 4.0
9.30
Gravedad 4.0
CRÍTICA



