此页面尚未翻译为您的语言。我们正在努力翻译,目前显示英文内容。
💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.
CVE-2026-1250: SQL Injection in Court Reservation Plugin
平台
wordpress
组件
court-reservation
修复版本
1.10.12
CVE-2026-1250 describes a SQL Injection vulnerability discovered in the Court Reservation – Manage Your Court Bookings Online plugin for WordPress. This flaw allows unauthenticated attackers to inject malicious SQL queries, potentially leading to unauthorized access to sensitive data. The vulnerability affects versions up to 1.10.11, and a patch is available in version 1.10.12. Prompt patching is recommended to mitigate the risk.
检测此 CVE 是否影响你的项目
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。
影响与攻击场景翻译中…
Successful exploitation of CVE-2026-1250 could allow an attacker to bypass authentication and directly query the WordPress database. This could result in the exfiltration of sensitive information such as user credentials (usernames and passwords), customer data (names, addresses, contact details), booking details, and potentially even administrative configurations. The attacker could also modify or delete data within the database, leading to data integrity issues and service disruption. While the plugin itself might not be directly exposed to the public internet, a compromised WordPress site could be used as a launchpad for further attacks on the internal network, expanding the blast radius of the vulnerability.
利用背景翻译中…
CVE-2026-1250 was published on May 12, 2026. Severity is rated HIGH with a CVSS score of 7.5. Currently, there are no publicly known active exploitation campaigns targeting this vulnerability. The presence of a readily exploitable SQL Injection vulnerability in a widely used WordPress plugin warrants close monitoring and proactive mitigation efforts.
威胁情报
漏洞利用状态
EPSS
0.06% (20% 百分位)
CISA SSVC
CVSS 向量
这些指标意味着什么?
- Attack Vector
- 网络 — 可通过互联网远程利用,无需物理或本地访问。攻击面最大。
- Attack Complexity
- 低 — 无需特殊条件,可以稳定地利用漏洞。
- Privileges Required
- 无 — 无需认证,无需凭证即可利用。
- User Interaction
- 无 — 攻击自动且无声,受害者无需任何操作。
- Scope
- 未改变 — 影响仅限于脆弱组件本身。
- Confidentiality
- 高 — 完全丧失机密性,攻击者可读取所有数据。
- Integrity
- 无 — 无完整性影响。
- Availability
- 无 — 无可用性影响。
弱点分类 (CWE)
时间线
- 已保留
- 发布日期
- 修改日期
- EPSS 更新日期
缓解措施和替代方案翻译中…
The primary mitigation for CVE-2026-1250 is to immediately upgrade the Court Reservation plugin to version 1.10.12 or later. If upgrading is not immediately feasible due to compatibility issues or testing requirements, consider implementing a Web Application Firewall (WAF) rule to filter out potentially malicious SQL injection attempts targeting the ‘id’ parameter. Specifically, look for unusual characters or SQL keywords in the parameter value. Additionally, review WordPress security best practices, including limiting user privileges and regularly scanning for vulnerabilities.
修复方法
更新至 1.10.12 版本,或更新的修复版本
常见问题翻译中…
What is CVE-2026-1250 — SQL Injection in Court Reservation Plugin?
CVE-2026-1250 is a SQL Injection vulnerability affecting the Court Reservation plugin for WordPress versions up to 1.10.11. It allows attackers to potentially extract sensitive data from the database.
Am I affected by CVE-2026-1250 in Court Reservation Plugin?
You are affected if you are using the Court Reservation plugin for WordPress in versions 1.10.11 or earlier. Check your plugin version immediately.
How do I fix CVE-2026-1250 in Court Reservation Plugin?
Upgrade the Court Reservation plugin to version 1.10.12 or later to resolve the vulnerability. Consider WAF rules as a temporary mitigation if immediate upgrade is not possible.
Is CVE-2026-1250 being actively exploited?
Currently, there are no publicly known active exploitation campaigns targeting CVE-2026-1250, but proactive patching is still essential.
Where can I find the official Court Reservation advisory for CVE-2026-1250?
Refer to the official Court Reservation plugin website or WordPress plugin repository for the latest advisory and update information.
检测此 CVE 是否影响你的项目
上传你的依赖文件,立即了解此CVE和其他CVE是否影响你。
立即扫描您的WordPress项目 — 无需账户
上传任何清单文件 (composer.lock, package-lock.json, WordPress 插件列表…) 或粘贴您的组件列表。您立即获得一份漏洞报告。上传文件只是开始:拥有账户后,您将获得持续监控、Slack/电子邮件警报、多项目和白标报告。
拖放您的依赖文件
composer.lock、package-lock.json、requirements.txt、Gemfile.lock、pubspec.lock、Dockerfile...