CVE-2026-9065
Description
SureCart version prior to 4.2.1 are vulnerable to authenticated SQL injection via multiple parameters ('model_name', 'model_id', 'integration_id', 'provider') on the REST API endpoint '/surecart/v1/integrations/{id}'.
The root cause is a flawed escaping bypass in the query builder ('wp-query-builder'). Values passed to the 'where()' method are only sanitized via '$wpdb->prepare()' when they do not contain a dot ('.') or the WordPress table prefix ('wp_'). By including a dot anywhere in the payload, an attacker completely bypasses the escaping logic and injects arbitrary SQL into the 'WHERE' clause, allowing full UNION-based extraction of the database.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Authenticated SQL injection in SureCart before 4.2.1 via dot bypass in query builder, allowing full database extraction.
Vulnerability
SureCart versions prior to 4.2.1 are vulnerable to authenticated SQL injection via the model_name, model_id, integration_id, and provider parameters on the REST API endpoint /surecart/v1/integrations/{id}. The root cause is a flawed escaping bypass in the wp-query-builder library: values passed to the where() method are only sanitized via $wpdb->prepare() when they do not contain a dot (.) or the WordPress table prefix (wp_). By including a dot in the payload, an attacker completely bypasses the escaping logic and can inject arbitrary SQL into the WHERE clause [1].
Exploitation
An attacker requires authentication with at least subscriber-level privileges on the WordPress site, as the vulnerable endpoint is accessible only to authenticated users. The attacker crafts a malicious value for any of the affected parameters (model_name, model_id, integration_id, provider) that includes a dot (.) and contains a SQL injection payload. When the request is processed, the flawed sanitization check sees the dot and skips the $wpdb->prepare() call, allowing the raw injected SQL to be executed. No additional user interaction or race condition is needed [1].
Impact
Successful exploitation allows a fully authenticated attacker to perform UNION-based SQL injection, enabling extraction of arbitrary data from the WordPress database, including user credentials, session tokens, and other sensitive information. This can lead to complete compromise of the WordPress site and all associated user accounts [1].
Mitigation
The vulnerability is fixed in SureCart version 4.2.1, released on April 27, 2026. Users must upgrade to 4.2.1 or later immediately. There are no known workarounds for unpatched versions [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<4.2.1+ 1 more
- (no CPE)range: <4.2.1
- (no CPE)range: <4.2.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.