<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Cve-2026-3985 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-3985/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 20 May 2026 02:18:34 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-3985/feed.xml" rel="self" type="application/rss+xml"/><item><title>Creative Mail WordPress Plugin Vulnerable to SQL Injection (CVE-2026-3985)</title><link>https://feed.craftedsignal.io/briefs/2026-05-creative-mail-sqli/</link><pubDate>Wed, 20 May 2026 02:18:34 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-creative-mail-sqli/</guid><description>The Creative Mail plugin for WordPress is vulnerable to SQL Injection due to insufficient escaping of the 'checkout_uuid' parameter and lack of sufficient preparation on the SQL query in the `has_checkout_consent()` method, allowing unauthenticated attackers to extract sensitive information from the database.</description><content:encoded><![CDATA[<p>The Creative Mail – Easier WordPress &amp; WooCommerce Email Marketing plugin, a popular email marketing tool for WordPress, is vulnerable to SQL Injection. Specifically, versions up to and including 1.6.9 are susceptible. The vulnerability resides in the <code>has_checkout_consent()</code> method, stemming from insufficient escaping of the user-supplied <code>checkout_uuid</code> parameter, compounded by a lack of sufficient preparation on the existing SQL query. This flaw enables unauthenticated attackers to inject malicious SQL queries, potentially leading to the extraction of sensitive data from the WordPress database. Successful exploitation could compromise user credentials, customer data, and other confidential information stored within the database.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a WordPress site using the vulnerable Creative Mail plugin (version &lt;= 1.6.9).</li>
<li>The attacker crafts a malicious HTTP request targeting an endpoint that utilizes the <code>has_checkout_consent()</code> method.</li>
<li>The malicious request includes a specifically crafted <code>checkout_uuid</code> parameter containing SQL injection payloads.</li>
<li>The vulnerable <code>has_checkout_consent()</code> method fails to properly sanitize the <code>checkout_uuid</code> parameter.</li>
<li>The unsanitized <code>checkout_uuid</code> parameter is incorporated into an SQL query without proper preparation or escaping.</li>
<li>The injected SQL code is executed against the WordPress database.</li>
<li>The attacker leverages the injected SQL to extract sensitive information, such as user credentials or customer data.</li>
<li>The attacker may use the extracted data for malicious purposes, including account takeover or data theft.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL Injection vulnerability (CVE-2026-3985) can lead to the compromise of sensitive data stored in the WordPress database. This includes user credentials, customer information, and potentially other confidential data. The CVSS v3.1 base score for this vulnerability is 7.5, indicating a high level of severity. An attacker could gain unauthorized access to the WordPress site, potentially leading to further compromise and damage. The number of affected websites is unknown but could be significant, given the popularity of the Creative Mail plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Creative Mail – Easier WordPress &amp; WooCommerce Email Marketing plugin to a version greater than 1.6.9 to patch CVE-2026-3985.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-3985 Exploitation Attempt via Creative Mail Plugin&rdquo; to your SIEM to identify potential exploitation attempts.</li>
<li>Monitor web server logs for suspicious requests containing SQL injection payloads in the <code>checkout_uuid</code> parameter (see example in Sigma rule test cases).</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>wordpress</category><category>plugin</category><category>cve-2026-3985</category><category>cloud</category></item></channel></rss>