<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>AWP Classifieds Plugin for WordPress (&lt;= 4.4.5) — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/awp-classifieds-plugin-for-wordpress--4.4.5/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 05 May 2026 03:15:59 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/awp-classifieds-plugin-for-wordpress--4.4.5/feed.xml" rel="self" type="application/rss+xml"/><item><title>AWP Classifieds WordPress Plugin SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-awp-classifieds-sqli/</link><pubDate>Tue, 05 May 2026 03:15:59 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-awp-classifieds-sqli/</guid><description>The AWP Classifieds plugin for WordPress is vulnerable to SQL Injection via the 'regions' parameter array keys in versions up to, and including, 4.4.5, potentially allowing unauthenticated attackers to extract sensitive information from the database.</description><content:encoded><![CDATA[<p>The AWP Classifieds plugin for WordPress, a popular plugin used to create classified ads websites, contains a critical SQL Injection vulnerability. This flaw, identified as CVE-2026-5100, affects versions up to and including 4.4.5. The vulnerability resides within the handling of the &lsquo;regions&rsquo; parameter array keys, where insufficient input sanitization and inadequate SQL query preparation allow unauthenticated attackers to inject arbitrary SQL code. Successful exploitation of this vulnerability can lead to the unauthorized extraction of sensitive data stored in the WordPress database. Given the widespread use of WordPress and the AWP Classifieds plugin, this vulnerability poses a significant risk to websites relying on the plugin for classifieds functionality.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website using a vulnerable version of the AWP Classifieds plugin (&lt;=4.4.5).</li>
<li>The attacker crafts a malicious HTTP request targeting the page search functionality.</li>
<li>The attacker injects SQL code into the &lsquo;regions&rsquo; parameter array keys within the crafted request.</li>
<li>The vulnerable code fails to properly sanitize the injected SQL code.</li>
<li>The application executes the attacker-controlled SQL query against the WordPress database.</li>
<li>The attacker is able to extract sensitive information, such as user credentials or other confidential data, from the database.</li>
<li>The attacker may use the extracted information to further compromise the WordPress website or related systems.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL Injection vulnerability (CVE-2026-5100) in the AWP Classifieds plugin could allow unauthenticated attackers to extract sensitive information from the affected WordPress database. This may include user credentials, personal data, or other confidential business information. The compromise of this information can lead to identity theft, financial fraud, and reputational damage. There is no victim count available, but all sites running vulnerable versions of this plugin are at risk.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the AWP Classifieds plugin to the latest version to patch CVE-2026-5100.</li>
<li>Deploy the provided Sigma rule <code>Detect AWP Classifieds SQL Injection Attempt</code> to detect exploitation attempts in web server logs.</li>
<li>Implement a web application firewall (WAF) with rules to filter out malicious SQL injection payloads targeting the &lsquo;regions&rsquo; parameter.</li>
<li>Review and harden database access controls to limit the potential impact of successful SQL injection attacks.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin</category></item></channel></rss>