CVE-2026-1719
Published: 06 May 2026
Description
The Gravity Bookings Premium plugin for WordPress is vulnerable to SQL Injection in all versions up to, and including, 2.5.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This…
more
makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.
Likely Mitigating ControlsAI
Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.
Security SummaryAI
CVE-2026-1719 is a SQL injection vulnerability (CWE-89) in the Gravity Bookings Premium plugin for WordPress, affecting all versions up to and including 2.5.9. The issue stems from insufficient escaping of a user-supplied parameter combined with a lack of sufficient preparation in the existing SQL query, enabling attackers to inject malicious SQL code.
Unauthenticated attackers can exploit this vulnerability over the network with low attack complexity, no privileges, and no user interaction required, earning it a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N). Exploitation allows appending additional SQL queries to ongoing ones, resulting in the extraction of sensitive information from the database.
Mitigation details are available in advisories from the plugin vendor at https://gravitybooking.com/ and Wordfence at https://www.wordfence.com/threat-intel/vulnerabilities/id/ce032abe-ee9d-4be1-ac97-5fa95d598e85?source=cve, published on 2026-05-06.
Details
- CWE(s)