The SQL Chart Builder WordPress plugin before 2.3.8 does not properly escape user input as it is concatened to SQL queries, making it possible for attackers to conduct SQL Injection attacks against the dynamic filter functionality.
References
| Link | Resource |
|---|---|
| https://wpscan.com/vulnerability/8ec92881-4ae5-458d-995b-f097f2bcc590/ | Third Party Advisory Exploit |
Configurations
History
09 Apr 2026, 19:51
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Guaven sql Chart Builder
Guaven |
|
| References | () https://wpscan.com/vulnerability/8ec92881-4ae5-458d-995b-f097f2bcc590/ - Third Party Advisory, Exploit | |
| CPE | cpe:2.3:a:guaven:sql_chart_builder:*:*:*:*:*:wordpress:*:* | |
| CWE | CWE-89 |
07 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
07 Apr 2026, 07:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-07 07:16
Updated : 2026-04-09 19:51
NVD link : CVE-2026-4079
Mitre link : CVE-2026-4079
CVE.ORG link : CVE-2026-4079
JSON object : View
Products Affected
guaven
- sql_chart_builder
CWE
CWE-89
Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
