<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>JoomSport – For Sports: Team &amp; League, Football, Hockey &amp; More Plugin &lt;= 5.7.7 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/joomsport--for-sports-team--league-football-hockey--more-plugin--5.7.7/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 13 May 2026 15:51:02 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/joomsport--for-sports-team--league-football-hockey--more-plugin--5.7.7/feed.xml" rel="self" type="application/rss+xml"/><item><title>JoomSport WordPress Plugin Vulnerable to Time-Based Blind SQL Injection (CVE-2026-6929)</title><link>https://feed.craftedsignal.io/briefs/2026-05-joomsport-sqli/</link><pubDate>Wed, 13 May 2026 15:51:02 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-joomsport-sqli/</guid><description>The JoomSport plugin for WordPress is vulnerable to time-based blind SQL Injection (CVE-2026-6929) via the 'sortf' parameter in versions up to 5.7.7, allowing unauthenticated attackers to extract sensitive information from the database.</description><content:encoded><![CDATA[<p>The JoomSport – for Sports: Team &amp; League, Football, Hockey &amp; more plugin for WordPress is susceptible to a time-based blind SQL Injection vulnerability. This flaw, identified as CVE-2026-6929, affects all versions up to and including 5.7.7. The vulnerability exists due to insufficient input sanitization of the &lsquo;sortf&rsquo; parameter and inadequate preparation of the SQL query. This allows unauthenticated attackers to inject malicious SQL code into existing queries, potentially leading to the extraction of sensitive database information. Successful exploitation could compromise the integrity and confidentiality of the WordPress site&rsquo;s data.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker sends a malicious HTTP request to the WordPress site.</li>
<li>The request targets an endpoint that utilizes the JoomSport plugin.</li>
<li>The attacker crafts the request to include a &lsquo;sortf&rsquo; parameter containing a time-based blind SQL injection payload.</li>
<li>The JoomSport plugin processes the request without properly sanitizing the &lsquo;sortf&rsquo; parameter.</li>
<li>The unsanitized input is incorporated into an SQL query executed against the WordPress database.</li>
<li>The injected SQL code leverages time-based delays to infer information about the database structure and content.</li>
<li>The attacker analyzes the response times to determine the results of the injected SQL queries.</li>
<li>Through repeated requests, the attacker extracts sensitive information, such as usernames, passwords, or other confidential data stored in the database.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability allows unauthenticated attackers to extract sensitive data from the WordPress database. This could include usernames, passwords, email addresses, and other confidential information. The impact ranges from data breaches and compromised user accounts to potential defacement of the website and further malicious activities. If the database contains sensitive financial data, the consequences could be even more severe.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the JoomSport – for Sports: Team &amp; League, Football, Hockey &amp; more plugin to the latest version to patch CVE-2026-6929.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-6929 Exploitation Attempt via JoomSport SQL Injection&rdquo; to your SIEM to identify potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads in the &lsquo;sortf&rsquo; parameter to identify and block malicious activity.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">threat</category><category>sqli</category><category>wordpress</category><category>cve-2026-6929</category><category>joomsport</category><category>injection</category></item></channel></rss>