Vulnerability Description
The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom Content Type (CCT) REST API search endpoint in all versions up to, and including, 3.8.6.1. This is due to the `_cct_search` parameter being interpolated directly into a SQL query string via `sprintf()` without sanitization or use of `$wpdb->prepare()`. WordPress REST API's `wp_unslash()` call on `$_GET` strips the `wp_magic_quotes()` protection, allowing single-quote-based injection. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The Custom Content Types module must be enabled with at least one CCT configured with a public REST GET endpoint for exploitation.
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://crocoblock.com/plugins/jetengine/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/29a5701f-92f7-4a02-a99
FAQ
What is CVE-2026-4352?
CVE-2026-4352 is a vulnerability with a CVSS score of 7.5 (HIGH). The JetEngine plugin for WordPress is vulnerable to SQL Injection via the Custom Content Type (CCT) REST API search endpoint in all versions up to, and including, 3.8.6.1. This is due to the `_cct_sea...
How severe is CVE-2026-4352?
CVE-2026-4352 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-4352?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.