SQL Injection Vulnerability in Geo Mashup Plugin for WordPress
CVE-2026-4062

7.5HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
2 May 2026

What is CVE-2026-4062?

The Geo Mashup plugin for WordPress is susceptible to a Time-Based SQL Injection vulnerability due to inadequate parameter escaping and improper SQL query preparation. This weakness allows unauthenticated attackers to inject additional SQL commands via the 'object_ids' and 'exclude_object_ids' parameters. Despite the presence of the esc_sql() function, its effectiveness is compromised as it only escapes quote characters without addressing the potential for parenthesis or SQL keyword injection within the problematic IN(...) / NOT IN(...) context. Moreover, the numeric-only sanitizer in sanitize_query_args() is inconsistently applied, leaving several code paths vulnerable. Consequently, attackers can exploit this flaw to manipulate SQL queries, potentially extracting sensitive information from the database through a time-based blind SQL injection method.

Affected Version(s)

Geo Mashup 0 <= 1.13.18

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Naoya Takahashi
.