CVE-2026-3334 - Vulnerability Analysis
HighCVSS: 8.8Last Updated: March 23, 2026
CMS Commander WordPress plugin - SQL Injection
Overview
CMS Commander WordPress plugin <= 2.288 contains a SQL injection caused by insufficient escaping of 'or_blogname', 'or_blogdescription', and 'or_admin_email' parameters in restore workflow SQL queries, letting authenticated attackers with API key access extract sensitive database information.
Severity & Score
Impact
Authenticated attackers can extract sensitive database information, potentially compromising data confidentiality.
Mitigation
Update to a version later than 2.288 or the latest available version.
References
- https://www.wordfence.com/threat-intel/vulnerabilities/id/0311b546-01a4-4be8-97f3-6df6cd79c3fe?source=cve
- https://plugins.trac.wordpress.org/browser/cms-commander-client/tags/2.288/lib/CMSC/Backup.php#L1366
- https://plugins.trac.wordpress.org/browser/cms-commander-client/tags/2.288/lib/CMSC/Backup.php#L1639
Social Media Activity(1 post)
š CVE-2026-3334 - High (8.8) The CMS Commander plugin for WordPress is vulnerable to SQL Injection via the 'or_blogname', 'or_blogdescription', and 'or_admin_email' parameters in all versions up to, and including, 2.288. This is due to insufficient escaping on the user suppli... š https://www.thehackerwire.com/vulnerability/CVE-2026-3334/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-3334
- Severity
- High
- CVSS Score
- 8.8
- Type
- sql_injection
- Status
- unconfirmed
- EPSS
- 2.9%
- Social Posts
- 1
CWE
- CWE-89
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H