Cyber Posture

CVE-2026-40797

Critical

Published: 05 May 2026

Published
05 May 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 9.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L
EPSS Score 0.0001 1.1th percentile
Risk Priority 19 60% EPSS · 20% KEV · 20% CVSS

Description

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saleswonder LLC WebinarIgnition allows Blind SQL Injection. This issue affects WebinarIgnition: from n/a through 4.08.253.

Mitigating Controls (NIST 800-53 r5)AI

prevent

Information Input Validation directly prevents blind SQL injection by requiring mechanisms to neutralize special elements in inputs used for SQL commands in the WebinarIgnition plugin.

prevent

Flaw Remediation mandates timely patching of the vulnerable WebinarIgnition plugin versions up to 4.08.253 to eliminate the SQL injection vulnerability.

prevent

Boundary Protection enables web application firewalls or similar controls at network interfaces to block SQL injection payloads targeting the unauthenticated plugin endpoint.

Security SummaryAI

CVE-2026-40797 is an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability, specifically enabling Blind SQL Injection, in the WebinarIgnition WordPress plugin developed by Saleswonder LLC. This flaw affects all versions of the plugin from n/a through 4.08.253. The vulnerability carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L), indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and scoped impact with high confidentiality loss.

Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction. Successful exploitation allows attackers to perform blind SQL injection, potentially extracting sensitive data from the underlying database, as reflected in the high confidentiality impact score, while causing limited availability disruption.

The primary advisory is available from Patchstack at https://patchstack.com/database/wordpress/plugin/webinar-ignition/vulnerability/wordpress-webinarignition-plugin-4-06-08-sql-injection-vulnerability?_s_id=cve, which details the vulnerability in the WebinarIgnition WordPress plugin.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

Direct unauthenticated blind SQLi in public-facing WordPress plugin enables remote exploitation of the web application for data extraction from the backend database.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References