<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-1250 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-1250/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Tue, 12 May 2026 23:17:36 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-1250/feed.xml" rel="self" type="application/rss+xml"/><item><title>WordPress Court Reservation Plugin SQL Injection Vulnerability (CVE-2026-1250)</title><link>https://feed.craftedsignal.io/briefs/2026-05-wordpress-court-reservation-sqli/</link><pubDate>Tue, 12 May 2026 23:17:36 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-wordpress-court-reservation-sqli/</guid><description>The Court Reservation – Manage Your Court Bookings Online plugin for WordPress versions 1.10.11 and earlier are vulnerable to SQL injection via the 'id' parameter, enabling unauthenticated attackers to extract sensitive database information.</description><content:encoded><![CDATA[<p>CVE-2026-1250 identifies a SQL injection vulnerability affecting the Court Reservation – Manage Your Court Bookings Online plugin for WordPress, impacting all versions up to and including 1.10.11. The vulnerability stems from insufficient escaping of the user-supplied &lsquo;id&rsquo; parameter within SQL queries, coupled with a lack of adequate preparation of these queries. This flaw allows unauthenticated attackers to inject arbitrary SQL commands into existing queries, potentially leading to the extraction of sensitive data from the WordPress database. This vulnerability poses a significant risk to website owners using the affected plugin, as attackers could gain access to user credentials, financial information, or other confidential data stored within the database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress website using a vulnerable version (&lt;= 1.10.11) of the Court Reservation plugin.</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the &lsquo;id&rsquo; parameter (e.g., a page or API endpoint that displays court reservation details).</li>
<li>The attacker injects SQL code into the &lsquo;id&rsquo; parameter within the HTTP request. For example, <code>id=1' OR '1'='1</code>.</li>
<li>The WordPress application processes the request, passing the unsanitized &lsquo;id&rsquo; parameter to the vulnerable SQL query.</li>
<li>The injected SQL code is executed within the database context, potentially modifying the query&rsquo;s original intent.</li>
<li>The attacker uses SQL injection techniques like <code>UNION SELECT</code> to extract sensitive data from other database tables, such as user credentials or configuration information.</li>
<li>The database returns the results of the modified query, which now includes the attacker-requested data.</li>
<li>The attacker retrieves the extracted sensitive information from the HTTP response.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL injection vulnerability (CVE-2026-1250) allows unauthenticated attackers to access sensitive information stored in the WordPress database. This can include user credentials (usernames, passwords, email addresses), personal information, and potentially financial data if stored in the database. The impact can range from account compromise and identity theft to data breaches and financial loss. Given the widespread use of WordPress and its plugins, a successful exploit could affect a significant number of websites and their users.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Court Reservation – Manage Your Court Bookings Online plugin to the latest version, which contains a patch for CVE-2026-1250.</li>
<li>Deploy the Sigma rule &ldquo;Detect WordPress Court Reservation Plugin SQL Injection (CVE-2026-1250)&rdquo; to detect exploitation attempts targeting the vulnerable &lsquo;id&rsquo; parameter.</li>
<li>Implement a web application firewall (WAF) rule to filter out requests containing potentially malicious SQL injection payloads in the &lsquo;id&rsquo; parameter.</li>
<li>Review WordPress database logs for suspicious queries containing SQL injection syntax.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sql-injection</category><category>wordpress</category><category>plugin</category><category>CVE-2026-1250</category><category>web-application</category></item></channel></rss>