CVE-2026-32539
PublishPress · PublishPress Revisions
PublishPress Revisions is vulnerable to Blind SQL Injection due to improper neutralization of special elements in SQL commands. This affects versions up to 3.7.23.
Executive summary
PublishPress Revisions for WordPress is vulnerable to a critical Blind SQL Injection attack, which could allow attackers to extract sensitive data from the site's database.
Vulnerability
The vulnerability is a Blind SQL Injection resulting from improper neutralization of user-supplied input used in SQL queries. An attacker can use specially crafted payloads to query the database indirectly, potentially identifying as an unauthenticated or low-privileged user depending on the revisionary access configuration.
Business impact
Successful exploitation can lead to the unauthorized disclosure of sensitive information, including user credentials, site configurations, and proprietary content. SQL injection is a high-impact flaw that can lead to complete database compromise. The CVSS score of 9.3 highlights the severe risk to data confidentiality and integrity.
Remediation
Immediate Action: Update the PublishPress Revisions plugin to the latest available version (greater than 3.7.23) to apply the necessary input sanitization fixes.
Proactive Monitoring: Monitor web server logs for suspicious URL parameters containing SQL keywords such as UNION, SELECT, SLEEP(), or AND/OR logic patterns.
Compensating Controls: Deploy a Web Application Firewall (WAF) with generic SQL injection protection rules to block malicious payloads before they reach the WordPress application.
Exploitation status
Public Exploit Available: No
Analyst recommendation
SQL injection remains one of the most dangerous web vulnerabilities. We recommend an immediate update to the latest version of PublishPress Revisions. Additionally, ensure that the database user for WordPress follows the principle of least privilege to limit the scope of any potential injection.