VYPR
High severity8.2NVD Advisory· Published May 10, 2026· Updated May 12, 2026

CVE-2021-47941

CVE-2021-47941

Description

WordPress Plugin Survey & Poll 1.5.7.3 contains an SQL injection vulnerability that allows unauthenticated attackers to execute arbitrary SQL queries by injecting malicious code through the wp_sap cookie parameter. Attackers can craft SQL payloads in the cookie to extract sensitive database information including usernames, passwords, and other confidential data from the WordPress database.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

An unauthenticated SQL injection in the Survey & Poll plugin 1.5.7.3 allows attackers to execute queries via the wp_sap cookie, exposing user credentials and database contents.

Vulnerability

The WordPress plugin Survey & Poll version 1.5.7.3 suffers from a SQL injection vulnerability. The flaw resides in how the plugin processes the wp_sap cookie parameter, specifically within the sss_params variable [1][2]. The application does not properly sanitize or validate this cookie input before constructing SQL queries, allowing an attacker to inject arbitrary SQL commands. This is a classic case of unvalidated data being passed directly into a database query.

Exploitation

An unauthenticated attacker can exploit this vulnerability by crafting a malicious HTTP request that includes a specially crafted wp_sap cookie. The attacker can inject SQL payloads into this cookie parameter without needing any prior authentication or special privileges [1][2]. The exploit requires network access to a target site running the vulnerable plugin, but no other user interaction or elevated permissions are necessary.

Impact

Successful exploitation enables an attacker to execute arbitrary SQL queries on the underlying database. This can lead to extraction of sensitive information, including usernames, hashed passwords, passwords, and other confidential data stored in the WordPress database [1][2]. The attacker may also be able to modify or delete data from other tables, potentially compromising the entire site's data integrity and confidentiality.

Mitigation

As of the analysis, the vendor has not released a patched version; the plugin may be end-of-life or no longer maintained. The best defense-in-depth recommendation is to disable or completely remove the plugin if it is installed. Users should also monitor for any official updates or alternative security measures such as Web Application Firewall (WAF) rules that can block SQL injection attempts.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

2

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

3

News mentions

0

No linked articles in our index yet.