WordPress Plugin Vulnerabilities
My Sticky Bar < 2.8.7 - Unauthenticated SQLi via 'stickymenu_contact_lead_form' Action
Description
The plugin is vulnerable to SQL injection via the `stickymenu_contact_lead_form` AJAX action due to the handler using attacker-controlled POST parameter names directly as SQL column identifiers in `$wpdb->insert()`. While parameter values are sanitized with `esc_sql()` and `sanitize_text_field()`, the parameter keys are used as-is to build the column list in the INSERT statement. This makes it possible for unauthenticated attackers to inject SQL via crafted parameter names, enabling blind time-based data extraction from the database.
Affects Plugins
References
Classification
Type
SQLI
OWASP top 10
CWE
CVSS
Miscellaneous
Original Researcher
Dimas Maulana
Verified
No
WPVDB ID
Timeline
Publicly Published
2026-03-11 (about 2 months ago)
Added
2026-03-11 (about 2 months ago)
Last Updated
2026-03-11 (about 2 months ago)