<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/">
  <channel>
    <title>CVE on Phat Mai Blog</title>
    <link>https://blog.pzhat.id.vn/categories/cve/</link>
    <description>Recent content in CVE on Phat Mai Blog</description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Wed, 31 Dec 2025 00:00:00 +0700</lastBuildDate>
    <atom:link href="https://blog.pzhat.id.vn/categories/cve/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>CVE-2026-1581 WordPress wpForo Forum Plugin is vulnerable to a high priority SQL Injection</title>
      <link>https://blog.pzhat.id.vn/posts/2026-21-02-cve-2026-1581/</link>
      <pubDate>Wed, 31 Dec 2025 00:00:00 +0700</pubDate>
      <guid>https://blog.pzhat.id.vn/posts/2026-21-02-cve-2026-1581/</guid>
      <description>&lt;h1 id=&#34;cve-2026-1581-wordpress-wpforo-forum-plugin-is-vulnerable-to-a-high-priority-sql-injection&#34;&gt;CVE-2026-1581 WordPress wpForo Forum Plugin is vulnerable to a high priority SQL Injection&lt;/h1&gt;
&lt;p&gt;&lt;img alt=&#34;image&#34; loading=&#34;lazy&#34; src=&#34;https://hackmd.io/_uploads/BJipTiSdbe.png&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Published:&lt;/strong&gt; 2026-02-19
&lt;strong&gt;CVE-ID:&lt;/strong&gt; CVE-2026-1581
&lt;strong&gt;CVSS:&lt;/strong&gt; 7.5
&lt;strong&gt;Affected Plugin:&lt;/strong&gt; WordPress wpForo Forum Plugin
&lt;strong&gt;Affected Versions:&lt;/strong&gt; &amp;lt;= 2.4.14
&lt;strong&gt;Vulnerability Type:&lt;/strong&gt; High priority SQL Injection
&lt;strong&gt;CWE:&lt;/strong&gt; CWE-89 Improper Neutralization of Special Elements used in an SQL Command.&lt;/p&gt;
&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;p&gt;The &lt;strong&gt;wpForo Forum plugin&lt;/strong&gt; for WordPress is vulnerable to &lt;strong&gt;time-based SQL Injection&lt;/strong&gt; via the &lt;strong&gt;&amp;lsquo;wpfob&amp;rsquo;&lt;/strong&gt; parameter in &lt;strong&gt;all versions&lt;/strong&gt; up to, and including, 2.4.14 due to &lt;strong&gt;insufficient escaping&lt;/strong&gt; on the user supplied parameter and &lt;strong&gt;lack of sufficient preparation&lt;/strong&gt; on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2026-0702 WordPress VidShop Plugin &lt;= 1.1.4 is vulnerable to a high priority SQL Injection</title>
      <link>https://blog.pzhat.id.vn/posts/2026-14-02-cve-2026-0702/</link>
      <pubDate>Tue, 30 Dec 2025 00:00:00 +0700</pubDate>
      <guid>https://blog.pzhat.id.vn/posts/2026-14-02-cve-2026-0702/</guid>
      <description>&lt;h1 id=&#34;cve-2026-0702-wordpress-vidshop-plugin--114-is-vulnerable-to-a-high-priority-sql-injection&#34;&gt;CVE-2026-0702 WordPress VidShop Plugin &amp;lt;= 1.1.4 is vulnerable to a high priority SQL Injection&lt;/h1&gt;
&lt;p&gt;&lt;img alt=&#34;image&#34; loading=&#34;lazy&#34; src=&#34;https://hackmd.io/_uploads/rkhOvm9vWg.png&#34;&gt;&lt;/p&gt;
&lt;h1 id=&#34;vidshop-plugin-vulnerable-to-sql-injection&#34;&gt;VidShop Plugin Vulnerable to SQL Injection&lt;/h1&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Published:&lt;/strong&gt; 2026-01-28&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CVE-ID:&lt;/strong&gt; CVE-2026-0702&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CVSS:&lt;/strong&gt; 7.5 High&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Plugin:&lt;/strong&gt; VidShop Plugin&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt;  &amp;lt;= 1.1.4&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability Type:&lt;/strong&gt; High priority SQL Injection&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CWE:&lt;/strong&gt; CWE-89 Improper Neutralization of Special Elements used in an SQL Command&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;p&gt;The VidShop – Shoppable Videos for WooCommerce plugin for WordPress is vulnerable to time-based SQL Injection via the &amp;lsquo;fields&amp;rsquo; parameter in all versions up to, and including, 1.1.4 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2026-23550 WordPress Modular DS Plugin &lt;= 2.5.1 is vulnerable to a high priority Privilege Escalation</title>
      <link>https://blog.pzhat.id.vn/posts/2026-11-02-cve-2026-23550/</link>
      <pubDate>Mon, 29 Dec 2025 00:00:00 +0700</pubDate>
      <guid>https://blog.pzhat.id.vn/posts/2026-11-02-cve-2026-23550/</guid>
      <description>&lt;h1 id=&#34;cve-2026-23550-wordpress-modular-ds-plugin--251-is-vulnerable-to-a-high-priority-privilege-escalation&#34;&gt;CVE-2026-23550 WordPress Modular DS Plugin &amp;lt;= 2.5.1 is vulnerable to a high priority Privilege Escalation&lt;/h1&gt;
&lt;p&gt;&lt;img alt=&#34;image&#34; loading=&#34;lazy&#34; src=&#34;https://hackmd.io/_uploads/HyLArhXPZg.png&#34;&gt;&lt;/p&gt;
&lt;h1 id=&#34;wordpress-modular-ds-plugin-privilege-escalation-vulnerability&#34;&gt;WordPress Modular DS Plugin Privilege Escalation Vulnerability&lt;/h1&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Published:&lt;/strong&gt; 2026-01-14&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CVE-ID:&lt;/strong&gt; CVE-2026-23550&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CVSS:&lt;/strong&gt; 10.0 Critical (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Plugin:&lt;/strong&gt; WordPress Modular DS Plugin&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; &amp;lt;= 2.5.1&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability Type:&lt;/strong&gt; High priority Privilege Escalation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CWE:&lt;/strong&gt; CWE-266 Incorrect Privilege Assignment&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;p&gt;Incorrect Privilege Assignment vulnerability in Modular DS allows Privilege Escalation.This issue affects Modular DS: from n/a through 2.5.1.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2026-3459 WordPress Drag and Drop Multiple File Upload – Contact Form 7 Plugin &lt;= 1.3.9.5 is vulnerable to a high priority Arbitrary File Upload</title>
      <link>https://blog.pzhat.id.vn/posts/2026-04-05-cve-2026-3459/</link>
      <pubDate>Sun, 28 Dec 2025 00:00:00 +0700</pubDate>
      <guid>https://blog.pzhat.id.vn/posts/2026-04-05-cve-2026-3459/</guid>
      <description>&lt;h2 id=&#34;cve-2026-3459-wordpress-drag-and-drop-multiple-file-upload--contact-form-7-plugin--1395-is-vulnerable-to-a-high-priority-arbitrary-file-upload&#34;&gt;CVE-2026-3459 WordPress Drag and Drop Multiple File Upload – Contact Form 7 Plugin &amp;lt;= 1.3.9.5 is vulnerable to a high priority Arbitrary File Upload&lt;/h2&gt;
&lt;p&gt;&lt;img alt=&#34;image&#34; loading=&#34;lazy&#34; src=&#34;https://hackmd.io/_uploads/BJZCp2osbl.png&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Published:&lt;/strong&gt; 2026-03-05
&lt;strong&gt;CVE-ID:&lt;/strong&gt; CVE-2026-3459
&lt;strong&gt;CVSS:&lt;/strong&gt; 8.1 High
&lt;strong&gt;Affected Plugin:&lt;/strong&gt; Drag and Drop Multiple File Upload – Contact Form 7 Plugin
&lt;strong&gt;Affected Versions:&lt;/strong&gt; &amp;lt;= 1.3.9.5
&lt;strong&gt;Vulnerability Type:&lt;/strong&gt; Arbitrary File Upload
&lt;strong&gt;CWE:&lt;/strong&gt; CWE-434 Unrestricted Upload of File with Dangerous Type&lt;/p&gt;
&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;p&gt;The Drag and Drop Multiple File Upload - Contact Form 7 plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the &lt;code&gt;&#39;dnd_upload_cf7_upload&#39;&lt;/code&gt; function in versions up to, and including, &lt;code&gt;1.3.7.3&lt;/code&gt;. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site&amp;rsquo;s server which may make remote code execution possible. This can be exploited if the form includes a multiple file upload field with ‘*’ as the accepted file type.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2026-2511 WordPress JS Help Desk Plugin &lt;= 3.0.4 is vulnerable to a high priority SQL Injection</title>
      <link>https://blog.pzhat.id.vn/posts/2026-04-02-cve-2026-2511/</link>
      <pubDate>Sat, 27 Dec 2025 00:00:00 +0700</pubDate>
      <guid>https://blog.pzhat.id.vn/posts/2026-04-02-cve-2026-2511/</guid>
      <description>&lt;h1 id=&#34;cve-2026-2511-js-help-desk--ai-powered-support--ticketing-system--304---unauthenticated-sql-injection-via-multiformid-parameter&#34;&gt;CVE-2026-2511 JS Help Desk – AI-Powered Support &amp;amp; Ticketing System &amp;lt;= 3.0.4 - Unauthenticated SQL Injection via &amp;lsquo;multiformid&amp;rsquo; Parameter&lt;/h1&gt;
&lt;p&gt;&lt;img alt=&#34;image&#34; loading=&#34;lazy&#34; src=&#34;https://hackmd.io/_uploads/Hkvne0ds-g.png&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Published:&lt;/strong&gt; 2026-03-26
&lt;strong&gt;CVE-ID:&lt;/strong&gt; CVE-2026-2511
&lt;strong&gt;CVSS:&lt;/strong&gt; 7.5 High
&lt;strong&gt;Affected Plugin:&lt;/strong&gt; JS Help Desk – AI-Powered Support &amp;amp; Ticketing System
&lt;strong&gt;Affected Versions:&lt;/strong&gt; &amp;lt;= 3.0.4
&lt;strong&gt;Vulnerability Type:&lt;/strong&gt; Unauthenticate SQL Injection
&lt;strong&gt;CWE:&lt;/strong&gt; CWE-89 Improper Neutralization of Special Elements used in an SQL Command&lt;/p&gt;
&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;p&gt;The &lt;strong&gt;JS Help Desk – AI-Powered Support &amp;amp; Ticketing System&lt;/strong&gt; plugin for WordPress is vulnerable to &lt;strong&gt;SQL Injection&lt;/strong&gt; via the &lt;code&gt;multiformid&lt;/code&gt; parameter in the &lt;code&gt;storeTickets()&lt;/code&gt; function in all versions up to, and including, 3.0.4. This is due to the user-supplied &lt;code&gt;multiformid&lt;/code&gt; value being passed to &lt;code&gt;esc_sql()&lt;/code&gt; without enclosing the result in quotes in the SQL query, rendering the escaping ineffective against payloads that do not contain quote characters. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2026-2232 Product Table and List Builder for WooCommerce Lite Vulnerable To Unauthenticated Time-Based SQL Injection</title>
      <link>https://blog.pzhat.id.vn/posts/2026-03-05-cve-2026-2232/</link>
      <pubDate>Fri, 26 Dec 2025 00:00:00 +0700</pubDate>
      <guid>https://blog.pzhat.id.vn/posts/2026-03-05-cve-2026-2232/</guid>
      <description>&lt;h1 id=&#34;cve-2026-2232-product-table-and-list-builder-for-woocommerce-lite-vulnerable-to-unauthenticated-time-based-sql-injection-via-search-parameter&#34;&gt;CVE-2026-2232 Product Table and List Builder for WooCommerce Lite Vulnerable To Unauthenticated Time-Based SQL Injection via &amp;lsquo;search&amp;rsquo; Parameter&lt;/h1&gt;
&lt;p&gt;&lt;img alt=&#34;image&#34; loading=&#34;lazy&#34; src=&#34;https://hackmd.io/_uploads/SkbyWJDObg.png&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Published:&lt;/strong&gt; 2026-02-19
&lt;strong&gt;CVE-ID:&lt;/strong&gt; CVE-2026-2232
&lt;strong&gt;CVSS:&lt;/strong&gt; 7.5 High
&lt;strong&gt;Affected Plugin:&lt;/strong&gt; Product Table and List Builder for WooCommerce Lite
&lt;strong&gt;Affected Versions:&lt;/strong&gt; &amp;lt;= 4.6.2
&lt;strong&gt;Vulnerability Type:&lt;/strong&gt; Unauthenticate Time-Based SQL Injection
&lt;strong&gt;CWE:&lt;/strong&gt; CWE-89 Improper Neutralization of Special Elements used in an SQL Command&lt;/p&gt;
&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;p&gt;The &lt;strong&gt;Product Table and List Builder for WooCommerce Lite plugin&lt;/strong&gt; for WordPress is vulnerable to &lt;strong&gt;time-based SQL Injection&lt;/strong&gt; via the &lt;strong&gt;&amp;lsquo;search&amp;rsquo; parameter&lt;/strong&gt; in &lt;strong&gt;all versions&lt;/strong&gt; up to, and including, &lt;strong&gt;4.6.2&lt;/strong&gt; due to &lt;strong&gt;insufficient escaping&lt;/strong&gt; on the user supplied parameter and &lt;strong&gt;lack of sufficient preparation&lt;/strong&gt; on the existing &lt;strong&gt;SQL query&lt;/strong&gt;. This makes it possible for unauthenticated attackers to append &lt;strong&gt;additional SQL queries&lt;/strong&gt; into already existing queries that can be used to &lt;strong&gt;extract sensitive information&lt;/strong&gt; from the database.&lt;/p&gt;</description>
    </item>
    <item>
      <title>WordPress HT Contact Form 7 Plugin &lt;= 2.2.1 is vulnerable to a high priority Arbitrary File Upload</title>
      <link>https://blog.pzhat.id.vn/posts/2026-03-03-cve-2025-7340/</link>
      <pubDate>Thu, 25 Dec 2025 00:00:00 +0700</pubDate>
      <guid>https://blog.pzhat.id.vn/posts/2026-03-03-cve-2025-7340/</guid>
      <description>&lt;h1 id=&#34;wordpress-ht-contact-form-7-plugin--221-is-vulnerable-to-a-high-priority-arbitrary-file-upload&#34;&gt;WordPress HT Contact Form 7 Plugin &amp;lt;= 2.2.1 is vulnerable to a high priority Arbitrary File Upload&lt;/h1&gt;
&lt;p&gt;&lt;img alt=&#34;image&#34; loading=&#34;lazy&#34; src=&#34;https://hackmd.io/_uploads/HJ5TohCu-g.png&#34;&gt;&lt;/p&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Published:&lt;/strong&gt; 2025-07-15
&lt;strong&gt;CVE-ID:&lt;/strong&gt; CVE-2025-7340
&lt;strong&gt;CVSS:&lt;/strong&gt; 10 Critical
&lt;strong&gt;Affected Plugin:&lt;/strong&gt; WordPress HT Contact Form 7 Plugin
&lt;strong&gt;Affected Versions:&lt;/strong&gt; &amp;lt;= 2.2.1
&lt;strong&gt;Vulnerability Type:&lt;/strong&gt; High priority Arbitrary File Upload
&lt;strong&gt;CWE:&lt;/strong&gt; CWE-434 Unrestricted Upload of File with Dangerous Type&lt;/p&gt;
&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;p&gt;The HT Contact Form Widget For Elementor Page Builder &amp;amp; Gutenberg Blocks &amp;amp; Form Builder. plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the temp_file_upload function in all versions up to, and including, 2.2.1. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site&amp;rsquo;s server which may make remote code execution possible.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2025-13329 File Uploader for WooCommerce</title>
      <link>https://blog.pzhat.id.vn/posts/2026-02-03-cve-2025-13329/</link>
      <pubDate>Wed, 24 Dec 2025 00:00:00 +0700</pubDate>
      <guid>https://blog.pzhat.id.vn/posts/2026-02-03-cve-2025-13329/</guid>
      <description>&lt;h1 id=&#34;cve-2025-13329-file-uploader-for-woocommerce--103---unauthenticated-arbitrary-file-upload-via-add-image-data&#34;&gt;CVE-2025-13329 File Uploader for WooCommerce &amp;lt;= 1.0.3 - Unauthenticated Arbitrary File Upload via add-image-data&lt;/h1&gt;
&lt;p&gt;&lt;img alt=&#34;image&#34; loading=&#34;lazy&#34; src=&#34;https://hackmd.io/_uploads/SJGvzVA8bg.png&#34;&gt;&lt;/p&gt;
&lt;h1 id=&#34;file-uploader-for-woocommerce-plugin&#34;&gt;File Uploader for WooCommerce Plugin&lt;/h1&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Published:&lt;/strong&gt; 2025-12-20&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CVE-ID:&lt;/strong&gt; CVE-2025-13329&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Plugin:&lt;/strong&gt; File Uploader for WooCommerce&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; &amp;lt;= 1.0.3&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability Type:&lt;/strong&gt; Unauthenticated Arbitrary File Upload via add-image-data&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CWE-434:&lt;/strong&gt; CWE-434 Unrestricted Upload of File with Dangerous Type&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;The File Uploader for WooCommerce&lt;/strong&gt; plugin for &lt;strong&gt;WordPress&lt;/strong&gt; is &lt;strong&gt;vulnerable to arbitrary file uploads&lt;/strong&gt; due to missing file type validation in the callback function for the &lt;strong&gt;&amp;lsquo;add-image-data&amp;rsquo;&lt;/strong&gt; &lt;strong&gt;REST API&lt;/strong&gt; endpoint in all versions up to, and including, &lt;strong&gt;1.0.3&lt;/strong&gt;. This makes it possible for &lt;strong&gt;unauthenticated&lt;/strong&gt; attackers to upload arbitrary files to the Uploadcare service and subsequently download them on the affected site&amp;rsquo;s server which may make &lt;strong&gt;remote code execution&lt;/strong&gt; possible.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2025-68519 WordPress Brands for WooCommerce Plugin</title>
      <link>https://blog.pzhat.id.vn/posts/2026-02-01-cve-2025-68519/</link>
      <pubDate>Tue, 23 Dec 2025 00:00:00 +0700</pubDate>
      <guid>https://blog.pzhat.id.vn/posts/2026-02-01-cve-2025-68519/</guid>
      <description>&lt;h1 id=&#34;cve-2025-68519-wordpress-brands-for-woocommerce-plugin--3863-is-vulnerable-to-sql-injection&#34;&gt;CVE-2025-68519 WordPress Brands for WooCommerce Plugin &amp;lt;= 3.8.6.3 is vulnerable to SQL Injection&lt;/h1&gt;
&lt;p&gt;&lt;img alt=&#34;image&#34; loading=&#34;lazy&#34; src=&#34;https://hackmd.io/_uploads/ByI6-ltIbg.png&#34;&gt;&lt;/p&gt;
&lt;h1 id=&#34;wordpress-brands-for-woocommerce-plugin&#34;&gt;WordPress Brands for WooCommerce Plugin&lt;/h1&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;Published:&lt;/strong&gt; 2025-12-24&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CVE ID:&lt;/strong&gt; CVE-2025-68519&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Plugin:&lt;/strong&gt; WordPress Brands for WooCommerce&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; &amp;lt;= 3.8.6.3&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability Type:&lt;/strong&gt; SQL Injection vulnerability&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Improper Neutralization of Special Elements&lt;/strong&gt; used in an &lt;strong&gt;SQL Command&lt;/strong&gt; (&amp;lsquo;SQL Injection&amp;rsquo;) vulnerability in &lt;strong&gt;BeRocket Brands&lt;/strong&gt; for WooCommerce brands-for-woocommerce allows &lt;strong&gt;Blind SQL Injection&lt;/strong&gt;.This issue affects Brands for WooCommerce: from n/a through &lt;strong&gt;&amp;lt;= 3.8.6.3&lt;/strong&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>CVE-2025-14770 – Unauthenticated SQL Injection via “city” Parameter</title>
      <link>https://blog.pzhat.id.vn/posts/2026-01-27-cve-2025-14770/</link>
      <pubDate>Mon, 22 Dec 2025 00:00:00 +0700</pubDate>
      <guid>https://blog.pzhat.id.vn/posts/2026-01-27-cve-2025-14770/</guid>
      <description>&lt;p&gt;&lt;img alt=&#34;image&#34; loading=&#34;lazy&#34; src=&#34;https://hackmd.io/_uploads/r1isJ3HLZl.png&#34;&gt;&lt;/p&gt;
&lt;h1 id=&#34;wordpress-shipping-rate-by-cities-plugin&#34;&gt;WordPress Shipping Rate By Cities Plugin&lt;/h1&gt;
&lt;h2 id=&#34;overview&#34;&gt;Overview&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;CVE ID:&lt;/strong&gt; CVE-2025-14770&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Plugin:&lt;/strong&gt; Shipping Rate By Cities&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Affected Versions:&lt;/strong&gt; ≤ 2.0.0&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerability Type:&lt;/strong&gt; Unauthenticated SQL Injection&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Attack Vector:&lt;/strong&gt; Network&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Authentication Required:&lt;/strong&gt; No&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 id=&#34;description&#34;&gt;Description&lt;/h2&gt;
&lt;p&gt;The &lt;strong&gt;Shipping Rate By Cities&lt;/strong&gt; WordPress plugin contains an &lt;strong&gt;unauthenticated SQL Injection&lt;/strong&gt; vulnerability in versions up to &lt;strong&gt;2.0.0&lt;/strong&gt;.
The issue originates from unsafe handling of the &lt;code&gt;city&lt;/code&gt; parameter, which is concatenated directly into an SQL query without proper preparation.&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
