Cyber Posture

CVE-2026-5100

High

Published: 05 May 2026

Published
05 May 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
EPSS Score 0.0010 27.8th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Description

The AWP Classifieds plugin for WordPress is vulnerable to SQL Injection via the 'regions' parameter array keys in versions up to, and including, 4.4.5 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the…

more

existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-89

Penetration testing uses SQL injection payloads against database interfaces, identifying and supporting fixes for SQL injection weaknesses.

addresses: CWE-89

Validates query inputs to prevent SQL syntax or command manipulation.

Security SummaryAI

CVE-2026-5100 is a SQL injection vulnerability in the AWP Classifieds plugin for WordPress, affecting versions up to and including 4.4.5. The flaw arises from insufficient escaping of the user-supplied 'regions' parameter array keys and inadequate preparation of the existing SQL query, allowing attackers to append malicious SQL queries. This issue, classified under CWE-89, carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N), highlighting high confidentiality impact with no requirements for privileges or user interaction.

Unauthenticated attackers can exploit this vulnerability remotely over the network with low complexity. By manipulating the 'regions' parameter in plugin requests, they can inject additional SQL queries into existing ones, enabling extraction of sensitive information from the database, such as user credentials or other confidential data.

The provided references point to specific locations in the plugin's source code, including lines 168, 174, 63, and 70 in frontend/page-search-ads.php, and line 1240 in functions.php, where the insufficient escaping and query preparation occur. No explicit patch or advisory details are available in the given information, but security practitioners should review these code sections and update to a fixed version if released.

Details

CWE(s)

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1213.006 Databases Collection
Adversaries may leverage databases to mine valuable information.
Why these techniques?

SQL injection in unauthenticated public-facing WordPress plugin directly enables remote exploitation of web applications (T1190) and permits arbitrary database queries for extraction of sensitive data such as credentials (T1213.006).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

References