<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Gravity Booking — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/gravity-booking/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 06 May 2026 10:16:18 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/gravity-booking/feed.xml" rel="self" type="application/rss+xml"/><item><title>Gravity Bookings Premium Plugin SQL Injection Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-gravity-bookings-sqli/</link><pubDate>Wed, 06 May 2026 10:16:18 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-gravity-bookings-sqli/</guid><description>The Gravity Bookings Premium plugin for WordPress is vulnerable to SQL Injection in versions up to 2.5.9, allowing unauthenticated attackers to extract sensitive information from the database.</description><content:encoded><![CDATA[<p>The Gravity Bookings Premium plugin for WordPress is susceptible to SQL Injection, as reported in CVE-2026-1719. The vulnerability affects all versions up to and including 2.5.9. It stems from insufficient input sanitization on user-supplied parameters combined with inadequate preparation of existing SQL queries. An unauthenticated attacker can exploit this by injecting malicious SQL queries into legitimate ones, potentially gaining unauthorized access to sensitive data within the WordPress database. This can lead to data breaches, privilege escalation, and other severe security incidents. The vulnerability was reported by Wordfence.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An unauthenticated attacker identifies a vulnerable endpoint in the Gravity Bookings Premium plugin that accepts user input.</li>
<li>The attacker crafts a malicious SQL query, embedding it within a legitimate-looking request to the vulnerable endpoint.</li>
<li>The crafted query exploits the lack of proper input sanitization to bypass security measures.</li>
<li>The injected SQL code is appended to the existing SQL query executed by the WordPress application.</li>
<li>The modified SQL query is executed against the WordPress database.</li>
<li>The injected SQL query extracts sensitive information, such as user credentials, booking details, or other confidential data.</li>
<li>The extracted data is returned to the attacker as part of the application&rsquo;s response or through other channels, such as database logs.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this SQL Injection vulnerability (CVE-2026-1719) can lead to the exposure of sensitive data stored in the WordPress database. This may include user credentials, personal information, and booking details. An attacker could use this information to compromise user accounts, gain unauthorized access to the WordPress administration panel, or launch further attacks against the system. The number of affected websites is potentially significant, given the popularity of the Gravity Bookings Premium plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the Gravity Bookings Premium plugin to the latest version (greater than 2.5.9) to patch CVE-2026-1719.</li>
<li>Deploy the Sigma rule &ldquo;Detect WordPress Gravity Bookings SQL Injection Attempt&rdquo; to identify potential exploitation attempts in web server logs.</li>
<li>Monitor web server logs for suspicious HTTP requests targeting the Gravity Bookings Premium plugin with potentially malicious SQL queries.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>sqli</category><category>wordpress</category><category>plugin</category></item></channel></rss>