{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/products/gravity-bookings-premium-plugin/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[{"cvss":7.5,"id":"CVE-2026-1719"}],"_cs_exploited":false,"_cs_products":["Gravity Bookings Premium plugin"],"_cs_severities":["high"],"_cs_tags":["sqli","wordpress","plugin"],"_cs_type":"advisory","_cs_vendors":["Gravity Booking"],"content_html":"\u003cp\u003eThe Gravity Bookings Premium plugin for WordPress is susceptible to SQL Injection, as reported in CVE-2026-1719. The vulnerability affects all versions up to and including 2.5.9. It stems from insufficient input sanitization on user-supplied parameters combined with inadequate preparation of existing SQL queries. An unauthenticated attacker can exploit this by injecting malicious SQL queries into legitimate ones, potentially gaining unauthorized access to sensitive data within the WordPress database. This can lead to data breaches, privilege escalation, and other severe security incidents. The vulnerability was reported by Wordfence.\u003c/p\u003e\n\u003ch2 id=\"attack-chain\"\u003eAttack Chain\u003c/h2\u003e\n\u003col\u003e\n\u003cli\u003eAn unauthenticated attacker identifies a vulnerable endpoint in the Gravity Bookings Premium plugin that accepts user input.\u003c/li\u003e\n\u003cli\u003eThe attacker crafts a malicious SQL query, embedding it within a legitimate-looking request to the vulnerable endpoint.\u003c/li\u003e\n\u003cli\u003eThe crafted query exploits the lack of proper input sanitization to bypass security measures.\u003c/li\u003e\n\u003cli\u003eThe injected SQL code is appended to the existing SQL query executed by the WordPress application.\u003c/li\u003e\n\u003cli\u003eThe modified SQL query is executed against the WordPress database.\u003c/li\u003e\n\u003cli\u003eThe injected SQL query extracts sensitive information, such as user credentials, booking details, or other confidential data.\u003c/li\u003e\n\u003cli\u003eThe extracted data is returned to the attacker as part of the application\u0026rsquo;s response or through other channels, such as database logs.\u003c/li\u003e\n\u003c/ol\u003e\n\u003ch2 id=\"impact\"\u003eImpact\u003c/h2\u003e\n\u003cp\u003eSuccessful exploitation of this SQL Injection vulnerability (CVE-2026-1719) can lead to the exposure of sensitive data stored in the WordPress database. This may include user credentials, personal information, and booking details. An attacker could use this information to compromise user accounts, gain unauthorized access to the WordPress administration panel, or launch further attacks against the system. The number of affected websites is potentially significant, given the popularity of the Gravity Bookings Premium plugin.\u003c/p\u003e\n\u003ch2 id=\"recommendation\"\u003eRecommendation\u003c/h2\u003e\n\u003cul\u003e\n\u003cli\u003eUpgrade the Gravity Bookings Premium plugin to the latest version (greater than 2.5.9) to patch CVE-2026-1719.\u003c/li\u003e\n\u003cli\u003eDeploy the Sigma rule \u0026ldquo;Detect WordPress Gravity Bookings SQL Injection Attempt\u0026rdquo; to identify potential exploitation attempts in web server logs.\u003c/li\u003e\n\u003cli\u003eMonitor web server logs for suspicious HTTP requests targeting the Gravity Bookings Premium plugin with potentially malicious SQL queries.\u003c/li\u003e\n\u003c/ul\u003e\n","date_modified":"2026-05-06T10:16:18Z","date_published":"2026-05-06T10:16:18Z","id":"/briefs/2026-05-gravity-bookings-sqli/","summary":"The Gravity Bookings Premium plugin for WordPress is vulnerable to SQL Injection in versions up to 2.5.9, allowing unauthenticated attackers to extract sensitive information from the database.","title":"Gravity Bookings Premium Plugin SQL Injection Vulnerability","url":"https://feed.craftedsignal.io/briefs/2026-05-gravity-bookings-sqli/"}],"language":"en","title":"CraftedSignal Threat Feed — Gravity Bookings Premium Plugin","version":"https://jsonfeed.org/version/1.1"}