SQL Execution Vulnerability in Koko Analytics Plugin for WordPress
CVE-2026-22850
What is CVE-2026-22850?
The Koko Analytics plugin, an open-source analytics solution for WordPress, is susceptible to arbitrary SQL execution due to improper handling of user-submitted data. Versions prior to 2.1.3 allow unauthenticated users to manipulate path and referrer parameters via a public tracking endpoint. These unescaped inputs are stored verbatim in the analytics database and later exported without adequate sanitization. When an admin imports the resulting SQL export, the lack of validation can lead to arbitrary commands being executed on the WordPress database, potentially allowing attackers to delete critical tables or inject backdoor accounts. Users must upgrade to version 2.1.3 or later to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
Affected Version(s)
koko-analytics < 2.1.3
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved