SQL Injection Vulnerability in JetEngine Plugin for WordPress
CVE-2026-4352

7.5HIGH

Key Information:

Vendor

WordPress

Status
Vendor
CVE Published:
14 April 2026

What is CVE-2026-4352?

The JetEngine plugin for WordPress presents a security risk through its Custom Content Type (CCT) REST API search endpoint across all versions up to 3.8.6.1. A flaw in the handling of the '_cct_search' parameter allows for direct interpolation into SQL queries without proper sanitization. Utilizing the wp_unslash() function on the $_GET variable removes necessary query protections, leading to possible single-quote injections. Attackers can exploit this vulnerability, enabling them to inject malicious SQL queries that may extract sensitive database information if the Custom Content Types feature is enabled with a configured public REST GET endpoint.

Affected Version(s)

JetEngine 0 <= 3.8.6.1

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

PhĂş
.