<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Geo Mashup Plugin &lt;= 1.13.18 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/geo-mashup-plugin--1.13.18/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Sat, 02 May 2026 12:16:16 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/geo-mashup-plugin--1.13.18/feed.xml" rel="self" type="application/rss+xml"/><item><title>Geo Mashup WordPress Plugin Vulnerable to Time-Based SQL Injection (CVE-2026-4062)</title><link>https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</link><pubDate>Sat, 02 May 2026 12:16:16 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-geo-mashup-sqli/</guid><description>The Geo Mashup WordPress plugin is vulnerable to Time-Based SQL Injection due to insufficient input sanitization, allowing unauthenticated attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>The Geo Mashup plugin for WordPress, in versions up to and including 1.13.18, contains a Time-Based SQL Injection vulnerability (CVE-2026-4062). The vulnerability exists within the &lsquo;object_ids&rsquo; and &rsquo;exclude_object_ids&rsquo; parameters. Insufficient escaping of user-supplied input, specifically within the <code>IN(...)</code> and <code>NOT IN(...)</code> SQL context, coupled with inadequate preparation of the existing SQL query, allows for the injection. The <code>esc_sql()</code> function is applied but is rendered ineffective due to its inability to protect against parenthesis or SQL keyword injection within the unquoted <code>IN(...)</code> / <code>NOT IN(...)</code> context. A numeric-only sanitizer exists in <code>sanitize_query_args()</code>, but this is only applied in the AJAX code path and not in the <code>render-map.php</code> or template tag code paths. This flaw enables unauthenticated attackers to append malicious SQL queries, facilitating the extraction of sensitive information from the WordPress database through a time-based blind SQL injection technique.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies the vulnerable Geo Mashup plugin running on a WordPress site.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters.</li>
<li>The attacker injects a time-based SQL injection payload into the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameter. This payload leverages SQL functions like <code>SLEEP()</code> or <code>BENCHMARK()</code> to introduce delays based on conditional SQL logic.</li>
<li>The vulnerable code fails to properly sanitize the injected SQL code due to the ineffective <code>esc_sql()</code> function in the <code>IN</code>/<code>NOT IN</code> context.</li>
<li>The injected SQL payload is appended to the existing SQL query executed by the Geo Mashup plugin.</li>
<li>The database server executes the combined query, including the injected time-based SQL injection.</li>
<li>The attacker monitors the response time of the HTTP request. A delayed response indicates that the injected SQL logic evaluated to true.</li>
<li>By repeatedly sending requests with different SQL injection payloads, the attacker can extract sensitive information from the database one character at a time.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability can lead to the complete compromise of the WordPress database. An attacker can extract sensitive information such as user credentials, API keys, configuration details, and other confidential data. This can result in data breaches, unauthorized access to the WordPress site, and potential further attacks on connected systems. The CVSS v3.1 base score for this vulnerability is 7.5, indicating a high severity.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Geo Mashup plugin to a version greater than 1.13.18 to remediate CVE-2026-4062.</li>
<li>Deploy the Sigma rule <code>Detect Geo Mashup Time-Based SQL Injection Attempts</code> to identify potential exploitation attempts targeting the vulnerable parameters.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads in the &lsquo;object_ids&rsquo; or &rsquo;exclude_object_ids&rsquo; parameters to detect exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>wordpress</category><category>plugin</category></item></channel></rss>