WordPress Ultimate Form Builder Lite 1.3.7 SQL Injection via entry_id
Description
WordPress Ultimate Form Builder Lite plugin version 1.3.7 and below contains an SQL injection vulnerability that allows authenticated attackers to manipulate database queries by injecting SQL code through the entry_id POST parameter. Attackers can send POST requests to the admin-ajax.php endpoint with the ufbl_get_entry_detail_action action to extract, modify, or escalate privileges within the WordPress database.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
WordPress Ultimate Form Builder Lite plugin ≤1.3.7 has an authenticated SQL injection via the entry_id parameter, enabling database manipulation.
Vulnerability
WordPress Ultimate Form Builder Lite plugin versions 1.3.7 and below contain an SQL injection vulnerability in the ufbl_get_entry_detail_action AJAX action. The entry_id POST parameter is passed unsanitized into a $wpdb->get_row() query, allowing authenticated attackers to inject arbitrary SQL. The vulnerable endpoint is wp-admin/admin-ajax.php [1][2].
Exploitation
An attacker must be authenticated with any WordPress user role that can access the plugin settings page (e.g., administrator or a user with plugin access). The attack sends a POST request to admin-ajax.php with action=ufbl_get_entry_detail_action, _wpnonce (valid nonce), and a malicious entry_id value. The injected SQL is executed directly against the WordPress database [1].
Impact
Successful exploitation allows the attacker to read, modify, or delete arbitrary database content, including user tables and options. This can lead to privilege escalation (e.g., creating new admin users), data extraction (e.g., password hashes, sensitive content), or other unauthorized actions depending on the injected query [1][2].
Mitigation
The vulnerability is fixed in version 1.3.8 or later of the Ultimate Form Builder Lite plugin. Users should update immediately. No workaround is available if the plugin cannot be updated. The plugin may be at end-of-life (EOL) status; verify with the vendor [1][2].
AI Insight generated on May 24, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1- Range: <=1.3.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.exploit-db.com/exploits/44884mitreexploit
- vulnerablesite.com/wp-admin/admin-ajax.phpmitrevendor-advisory
- www.vulncheck.com/advisories/wordpress-ultimate-form-builder-lite-sql-injection-via-entry-idmitrethird-party-advisory
News mentions
0No linked articles in our index yet.