CVE-2026-4348
SQL Injection in BetterDocs Pro WordPress Plugin
Publication date: 2026-05-07
Last updated on: 2026-05-07
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wpbeaver | betterdocs_pro | to 3.7.0 (inc) |
| wpbeaver | betterdocs_pro | to 4.3.11 (exc) |
| wpbeaverbuilder | betterdocs_pro | to 3.7.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-89 | The product constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component. Without sufficient removal or quoting of SQL syntax in user-controllable inputs, the generated SQL query can cause those inputs to be interpreted as SQL instead of ordinary user data. |
Attack-Flow Graph
AI Powered Q&A
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to perform SQL Injection attacks that can extract sensitive information from the database.
Exposure of sensitive information through such attacks could potentially lead to non-compliance with data protection regulations like GDPR or HIPAA, which require safeguarding personal and sensitive data.
However, the provided context and resources do not explicitly discuss the impact of this vulnerability on compliance with specific standards or regulations.
Can you explain this vulnerability to me?
The BetterDocs Pro plugin for WordPress has a SQL Injection vulnerability in versions up to and including 3.7.0. This occurs because the `limit` POST parameter is directly inserted into a SQL query string before being passed to the database prepare function, which only parameterizes other variables. As a result, unauthenticated attackers can append additional SQL queries to extract sensitive information from the database. The vulnerability can only be exploited if the Encyclopedia feature is enabled in the plugin settings.
How can this vulnerability impact me? :
This vulnerability allows unauthenticated attackers to perform SQL Injection attacks, potentially extracting sensitive information from the database. Since the attack does not require authentication, it poses a significant risk of data exposure. The CVSS score of 7.5 indicates a high severity impact on confidentiality, although it does not affect integrity or availability.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update the BetterDocs Pro plugin to the latest patched version. The vulnerability was fixed in version 4.3.11, released on April 15, 2026.
Additionally, ensure that the Encyclopedia feature in BetterDocs Pro settings is disabled if you cannot immediately update, as the vulnerability requires this feature to be enabled to be exploitable.