CVE-2026-40797
Published: 05 May 2026
Description
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Saleswonder LLC WebinarIgnition allows Blind SQL Injection. This issue affects WebinarIgnition: from n/a through 4.08.253.
Mitigating Controls (NIST 800-53 r5)AI
Information Input Validation directly prevents blind SQL injection by requiring mechanisms to neutralize special elements in inputs used for SQL commands in the WebinarIgnition plugin.
Flaw Remediation mandates timely patching of the vulnerable WebinarIgnition plugin versions up to 4.08.253 to eliminate the SQL injection vulnerability.
Boundary Protection enables web application firewalls or similar controls at network interfaces to block SQL injection payloads targeting the unauthenticated plugin endpoint.
Security SummaryAI
CVE-2026-40797 is an Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability, specifically enabling Blind SQL Injection, in the WebinarIgnition WordPress plugin developed by Saleswonder LLC. This flaw affects all versions of the plugin from n/a through 4.08.253. The vulnerability carries a CVSS v3.1 base score of 9.3 (AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:L), indicating critical severity due to its network accessibility, low attack complexity, lack of required privileges or user interaction, and scoped impact with high confidentiality loss.
Unauthenticated remote attackers can exploit this vulnerability over the network with low complexity and no user interaction. Successful exploitation allows attackers to perform blind SQL injection, potentially extracting sensitive data from the underlying database, as reflected in the high confidentiality impact score, while causing limited availability disruption.
The primary advisory is available from Patchstack at https://patchstack.com/database/wordpress/plugin/webinar-ignition/vulnerability/wordpress-webinarignition-plugin-4-06-08-sql-injection-vulnerability?_s_id=cve, which details the vulnerability in the WebinarIgnition WordPress plugin.
Details
- CWE(s)
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct unauthenticated blind SQLi in public-facing WordPress plugin enables remote exploitation of the web application for data extraction from the backend database.