wpForo 2.4.14 contains an unauthenticated SQL injection vulnerability in Topics::get_topics() where the ORDER BY clause relies on ineffective esc_sql() sanitization on unquoted identifiers. Attackers exploit the wpfob parameter with CASE WHEN payloads to perform blind boolean extraction of credentials from the WordPress database.
History

Mon, 02 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sun, 01 Mar 2026 00:00:00 +0000

Type Values Removed Values Added
Title wpForo 2.4.14 SQL Injection via Topics ORDER BY Parameter wpForo Forum 2.4.14 SQL Injection via Topics ORDER BY Parameter

Sat, 28 Feb 2026 22:00:00 +0000

Type Values Removed Values Added
Description wpForo 2.4.14 contains an unauthenticated SQL injection vulnerability in Topics::get_topics() where the ORDER BY clause relies on ineffective esc_sql() sanitization on unquoted identifiers. Attackers exploit the wpfob parameter with CASE WHEN payloads to perform blind boolean extraction of credentials from the WordPress database.
Title wpForo 2.4.14 SQL Injection via Topics ORDER BY Parameter
First Time appeared Gvectors
Gvectors wpforo Forum
Weaknesses CWE-89
CPEs cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:*:*:*
cpe:2.3:a:gvectors:wpforo_forum:2.4.15:*:*:*:*:*:*:*
Vendors & Products Gvectors
Gvectors wpforo Forum
References
Metrics cvssV3_1

{'score': 8.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N'}

cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-02-28T21:47:41.769Z

Updated: 2026-02-28T23:44:49.585Z

Reserved: 2026-02-28T20:46:46.102Z

Link: CVE-2026-28562

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-28T22:16:03.560

Modified: 2026-03-02T20:30:10.923

Link: CVE-2026-28562

cve-icon Redhat

No data.