Home

Description

The BetterDocs Pro plugin for WordPress is vulnerable to SQL Injection via the `get_current_letter_docs` and `docs_sort_by_letter` AJAX actions in all versions up to, and including, 3.7.0. This is due to the `limit` POST parameter being interpolated directly into a SQL query string before being passed to `$wpdb->prepare()`, which only parameterizes other variables. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The Encyclopedia feature must be enabled in BetterDocs Pro settings for the vulnerability to be exploitable.

PUBLISHED Reserved 2026-03-17 | Published 2026-05-07 | Updated 2026-05-07 | Assigner Wordfence




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')

Product status

Default status
unaffected

Any version
affected

Timeline

2026-04-01:Vendor Notified
2026-05-06:Disclosed

Credits

Phú finder

References

www.wordfence.com/...-f5f1-42b1-8116-e391aaa85430?source=cve

betterdocs.co/changelog/

cve.org (CVE-2026-4348)

nvd.nist.gov (CVE-2026-4348)

Download JSON