CVE-2026-32539

PublishPress · PublishPress Revisions

PublishPress Revisions is vulnerable to Blind SQL Injection due to improper neutralization of special elements in SQL commands. This affects versions up to 3.7.23.

Executive summary

PublishPress Revisions for WordPress is vulnerable to a critical Blind SQL Injection attack, which could allow attackers to extract sensitive data from the site's database.

Vulnerability

The vulnerability is a Blind SQL Injection resulting from improper neutralization of user-supplied input used in SQL queries. An attacker can use specially crafted payloads to query the database indirectly, potentially identifying as an unauthenticated or low-privileged user depending on the revisionary access configuration.

Business impact

Successful exploitation can lead to the unauthorized disclosure of sensitive information, including user credentials, site configurations, and proprietary content. SQL injection is a high-impact flaw that can lead to complete database compromise. The CVSS score of 9.3 highlights the severe risk to data confidentiality and integrity.

Remediation

Immediate Action: Update the PublishPress Revisions plugin to the latest available version (greater than 3.7.23) to apply the necessary input sanitization fixes.

Proactive Monitoring: Monitor web server logs for suspicious URL parameters containing SQL keywords such as UNION, SELECT, SLEEP(), or AND/OR logic patterns.

Compensating Controls: Deploy a Web Application Firewall (WAF) with generic SQL injection protection rules to block malicious payloads before they reach the WordPress application.

Exploitation status

Public Exploit Available: No

Analyst recommendation

SQL injection remains one of the most dangerous web vulnerabilities. We recommend an immediate update to the latest version of PublishPress Revisions. Additionally, ensure that the database user for WordPress follows the principle of least privilege to limit the scope of any potential injection.