wpForo 2.4.14 contains an unauthenticated SQL injection vulnerability in Topics::get_topics() where the ORDER BY clause relies on ineffective esc_sql() sanitization on unquoted identifiers. Attackers exploit the wpfob parameter with CASE WHEN payloads to perform blind boolean extraction of credentials from the WordPress database.
References
| Link | Resource |
|---|---|
| https://wordpress.org/plugins/wpforo/ | Product |
| https://wordpress.org/plugins/wpforo/#developers | Release Notes |
| https://www.vulncheck.com/advisories/wpforo-sql-injection-via-topics-order-by-parameter | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-02-28 22:16
Updated : 2026-03-05 15:41
NVD link : CVE-2026-28562
Mitre link : CVE-2026-28562
CVE.ORG link : CVE-2026-28562
JSON object : View
Products Affected
gvectors
- wpforo_forum
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
