CVE-2026-28562

wpForo 2.4.14 contains an unauthenticated SQL injection vulnerability in Topics::get_topics() where the ORDER BY clause relies on ineffective esc_sql() sanitization on unquoted identifiers. Attackers exploit the wpfob parameter with CASE WHEN payloads to perform blind boolean extraction of credentials from the WordPress database.
Configurations

Configuration 1 (hide)

cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:*

History

05 Mar 2026, 15:41

Type Values Removed Values Added
References () https://wordpress.org/plugins/wpforo/ - () https://wordpress.org/plugins/wpforo/ - Product
References () https://wordpress.org/plugins/wpforo/#developers - () https://wordpress.org/plugins/wpforo/#developers - Release Notes
References () https://www.vulncheck.com/advisories/wpforo-sql-injection-via-topics-order-by-parameter - () https://www.vulncheck.com/advisories/wpforo-sql-injection-via-topics-order-by-parameter - Third Party Advisory
First Time Gvectors
Gvectors wpforo Forum
CPE cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:*

02 Mar 2026, 20:30

Type Values Removed Values Added
Summary
  • (es) wpForo 2.4.14 contiene una vulnerabilidad de inyección SQL no autenticada en Topics::get_topics() donde la cláusula ORDER BY se basa en una sanitización ineficaz de esc_sql() en identificadores sin comillas. Los atacantes explotan el parámetro wpfob con cargas útiles CASE WHEN para realizar una extracción booleana ciega de credenciales de la base de datos de WordPress.

28 Feb 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-28 22:16

Updated : 2026-03-05 15:41


NVD link : CVE-2026-28562

Mitre link : CVE-2026-28562

CVE.ORG link : CVE-2026-28562


JSON object : View

Products Affected

gvectors

  • wpforo_forum
CWE
CWE-89

Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')