vulnerability
WordPress Plugin: email-subscribers: CVE-2022-0439: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 7 | (AV:N/AC:L/Au:S/C:P/I:P/A:P) | Feb 11, 2022 | May 15, 2025 | Apr 30, 2026 |
Severity
7
CVSS
(AV:N/AC:L/Au:S/C:P/I:P/A:P)
Published
Feb 11, 2022
Added
May 15, 2025
Modified
Apr 30, 2026
Description
The Email Subscribers and Newsletters WordPress plugin before 5.3.2 does not correctly escape the `order` and `orderby` parameters to the `ajax_fetch_report_list` action, making it vulnerable to blind SQL injection attacks by users with roles as low as Subscriber. Further, it does not have any CSRF protection in place for the action, allowing an attacker to trick any logged in user to perform the action by clicking a link.
Solution
email-subscribers-plugin-cve-2022-0439
References
- https://www.cve.org/CVERecord?id=CVE-2022-0439
- https://www.wordfence.com/threat-intel/vulnerabilities/id/8b9e3aaf-5182-4622-9b5b-d67af200e2b6?source=api-prod
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2022-15578
- CVE-2022-0439
- https://attackerkb.com/topics/CVE-2022-0439
- CWE-89
- CWE-352
- EUVD-EUVD-2022-15578
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.