Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0678: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in logiceverest Shipping Rates by City for WooCommerce

0
Medium
VulnerabilityCVE-2026-0678cvecve-2026-0678cwe-89
Published: Wed Jan 14 2026 (01/14/2026, 05:28:08 UTC)
Source: CVE Database V5
Vendor/Project: logiceverest
Product: Shipping Rates by City for WooCommerce

Description

CVE-2026-0678 is a medium-severity SQL Injection vulnerability in the Flat Shipping Rate by City for WooCommerce WordPress plugin, affecting all versions up to 1. 0. 3. The flaw arises from improper sanitization of the 'cities' parameter, allowing authenticated users with Shop Manager or higher privileges to inject malicious SQL commands. This vulnerability can be exploited without user interaction to extract sensitive database information, impacting confidentiality but not integrity or availability. No known public exploits exist yet. European e-commerce sites using WooCommerce with this plugin are at risk, especially in countries with high WooCommerce adoption. Mitigation requires updating the plugin once a patch is available or applying strict input validation and least privilege principles in the meantime.

AI-Powered Analysis

AILast updated: 01/14/2026, 06:04:50 UTC

Technical Analysis

The vulnerability identified as CVE-2026-0678 affects the Flat Shipping Rate by City for WooCommerce plugin for WordPress, specifically versions up to and including 1.0.3. It is a time-based SQL Injection vulnerability caused by improper neutralization of special elements in SQL commands (CWE-89). The issue stems from insufficient escaping and lack of prepared statements for the 'cities' parameter, which is user-supplied. Authenticated attackers with Shop Manager-level access or higher can exploit this flaw by injecting additional SQL queries into existing database queries. This allows them to extract sensitive information from the backend database without affecting data integrity or availability. The attack vector is network-based with low attack complexity, requiring no user interaction but necessitating elevated privileges. The CVSS v3.1 score is 4.9 (medium severity), reflecting the moderate risk due to required privileges and limited scope. No patches or known exploits are currently available, but the vulnerability poses a risk to WooCommerce installations using this plugin, especially in e-commerce environments where sensitive customer and transaction data is stored.

Potential Impact

For European organizations, particularly those operating e-commerce platforms on WordPress with WooCommerce, this vulnerability could lead to unauthorized disclosure of sensitive customer data, including personal and transactional information. The confidentiality breach could result in regulatory non-compliance under GDPR, leading to legal and financial penalties. Although the vulnerability does not affect data integrity or availability, the exposure of sensitive data can damage brand reputation and customer trust. Attackers with Shop Manager access could leverage this flaw to gain insights into the database schema or extract credentials, potentially facilitating further attacks. The impact is more pronounced for medium to large online retailers in Europe that rely on this plugin for shipping rate calculations by city, as they typically have more complex databases and higher volumes of sensitive data.

Mitigation Recommendations

Immediate mitigation involves restricting Shop Manager and higher privileges to trusted personnel only, minimizing the risk of insider threats. Implement strict input validation and sanitization on the 'cities' parameter at the application level to prevent injection. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious SQL injection patterns targeting this parameter. Monitor logs for unusual database query patterns or access attempts by Shop Manager accounts. Since no official patch is currently available, consider temporarily disabling or replacing the plugin with a secure alternative. Once a vendor patch is released, apply it promptly. Additionally, conduct regular security audits and penetration testing focusing on plugins and custom code handling user input. Educate administrators on the risks associated with elevated privileges and enforce the principle of least privilege.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-07T17:45:17.514Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69672e028330e067168f4049

Added to database: 1/14/2026, 5:47:46 AM

Last enriched: 1/14/2026, 6:04:50 AM

Last updated: 1/14/2026, 7:09:09 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats