Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3657: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in premio My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu)

0
High
VulnerabilityCVE-2026-3657cvecve-2026-3657cwe-89
Published: Thu Mar 12 2026 (03/12/2026, 02:22:36 UTC)
Source: CVE Database V5
Vendor/Project: premio
Product: My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu)

Description

The My Sticky Bar plugin for WordPress is vulnerable to SQL injection via the `stickymenu_contact_lead_form` AJAX action in all versions up to, and including, 2.8.6. This is due to the handler using attacker-controlled POST parameter names directly as SQL column identifiers in `$wpdb->insert()`. While parameter values are sanitized with `esc_sql()` and `sanitize_text_field()`, the parameter keys are used as-is to build the column list in the INSERT statement. This makes it possible for unauthenticated attackers to inject SQL via crafted parameter names, enabling blind time-based data extraction from the database.

AI-Powered Analysis

AILast updated: 03/12/2026, 03:14:56 UTC

Technical Analysis

CVE-2026-3657 is an SQL injection vulnerability found in the WordPress plugin My Sticky Bar – Floating Notification Bar & Sticky Header (formerly myStickymenu), affecting all versions up to 2.8.6. The vulnerability stems from improper handling of POST request parameter names in the AJAX action 'stickymenu_contact_lead_form'. Specifically, the plugin uses the parameter keys directly as SQL column identifiers in the $wpdb->insert() function without sanitization, while only the parameter values undergo sanitization via esc_sql() and sanitize_text_field(). This improper neutralization of special elements (CWE-89) allows an unauthenticated attacker to craft malicious POST parameter names that manipulate the SQL query structure, enabling blind time-based SQL injection attacks. Such attacks can be used to extract sensitive data from the underlying database without direct visibility of the data, relying on response timing to infer information. The vulnerability requires no authentication or user interaction, increasing its risk. Although no public exploits have been reported yet, the ease of exploitation and the widespread use of WordPress and this plugin make it a significant threat. The CVSS v3.1 score of 7.5 reflects high severity, with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The scope is unchanged, and the impact is primarily on confidentiality, with no direct integrity or availability impact reported.

Potential Impact

The primary impact of CVE-2026-3657 is unauthorized disclosure of sensitive information stored in the WordPress site's database. Attackers exploiting this vulnerability can extract data such as user credentials, personal information, or other confidential content managed by the site. This can lead to privacy violations, identity theft, or further compromise of the affected systems. Since the vulnerability is exploitable remotely without authentication or user interaction, it poses a significant risk to any WordPress site using the affected plugin. The attack does not directly affect data integrity or availability, but data leakage alone can have severe consequences for organizations, including reputational damage, regulatory penalties, and loss of customer trust. Given the popularity of WordPress globally and the plugin's usage, the potential attack surface is large, especially for small to medium-sized businesses that may not have robust security monitoring. The lack of known exploits in the wild currently provides a window for proactive mitigation before widespread exploitation occurs.

Mitigation Recommendations

To mitigate CVE-2026-3657, organizations should immediately update the My Sticky Bar plugin to a patched version once released by the vendor. Until a patch is available, administrators should consider disabling the plugin or the vulnerable AJAX action 'stickymenu_contact_lead_form' to prevent exploitation. Web application firewalls (WAFs) can be configured to detect and block suspicious POST requests with anomalous parameter names that could indicate SQL injection attempts. Additionally, implementing strict input validation and sanitization on all user-supplied data, including parameter keys, is critical. Site owners should audit their WordPress installations for the presence of this plugin and monitor logs for unusual activity related to AJAX requests. Employing database activity monitoring to detect abnormal query patterns can also help identify exploitation attempts. Regular backups and incident response plans should be in place to recover from potential data breaches. Finally, educating developers and administrators about secure coding practices, especially regarding dynamic SQL query construction, will help prevent similar vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-03-06T18:19:56.674Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69b22c262f860ef943edb6e8

Added to database: 3/12/2026, 2:59:50 AM

Last enriched: 3/12/2026, 3:14:56 AM

Last updated: 3/14/2026, 2:21:10 AM

Views: 20

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses