SQL Injection Vulnerability in Database Management Systems by WordPress
CVE-2026-6888
7.2HIGH
What is CVE-2026-6888?
This vulnerability allows remote authenticated attackers to exploit SQL injection flaws through a specific interface, potentially gaining unauthorized access to sensitive information within the database. Successful exploitation may enable attackers to execute arbitrary commands, leading to data modification or deletion, and ultimately putting the integrity of the database at risk.
Affected Version(s)
ECOWatch SaaS-Composer prior to version 3.4.17
IoT Edge Linux docker prior to version 2.2.0
IoT Edge Windows prior to version 2.2.0
