Media Search Enhanced Vulnerability (Medium) – CVE-2026-23805

Media Search Enhanced Vulnerability (Medium) – CVE-2026-23805

by | Feb 26, 2026 | Plugins

Attack Vectors

CVE-2026-23805 is a Medium severity (CVSS 6.5) SQL Injection vulnerability affecting the Media Search Enhanced WordPress plugin (media-search-enhanced) in versions up to and including 0.9.1. The attack requires an authenticated WordPress account with Author-level permissions or higher, meaning it is most relevant where multiple users can publish content or upload media (e.g., marketing teams, agencies, or multi-author sites).

Because the vulnerability is exploitable over the network with low attack complexity and no user interaction required (per the CVSS vector), a compromised Author account (from password reuse, phishing, or credential stuffing) could be enough to trigger the issue and attempt to pull data from the database.

Security Weakness

The root issue is insufficient escaping of a user-supplied parameter and a lack of proper SQL query preparation in Media Search Enhanced versions through 0.9.1. In practical terms, this can allow an attacker to append SQL to an existing database query.

According to the published advisory, successful exploitation can enable attackers (with Author+ access) to extract sensitive information from the WordPress database. While the CVSS indicates high confidentiality impact, it does not indicate integrity or availability impact in the score vector provided.

Technical or Business Impacts

For business stakeholders, the main risk is data exposure. WordPress databases can contain information that may be sensitive to brand, operations, and compliance needs—depending on what your site stores (e.g., user emails, internal metadata, or other site content). If an attacker can extract database information, the impact can include privacy concerns, regulatory exposure, and reputational damage, especially if the compromised site supports campaigns that collect leads or manage customer communications.

This vulnerability also increases the “blast radius” of common account compromise scenarios: an attacker who only gains an Author credential could potentially access more information than that role normally permits. For marketing and compliance teams, that translates to higher risk during busy periods when temporary accounts, contractors, or agency access are common.

Remediation

Update Media Search Enhanced to version 0.9.2 or newer, which is the recommended remediation. If you cannot update immediately, consider temporarily disabling the plugin to reduce exposure, especially on sites with multiple authors or frequent contributor onboarding.

Operationally, also review who has Author and above access, remove unnecessary accounts, and ensure strong authentication practices are enforced (unique passwords and, where possible, additional login protections). These steps help reduce the likelihood that an authenticated attacker can reach the vulnerable functionality.

Similar Attacks

SQL injection remains one of the most common ways attackers extract data from web applications. For additional context, here are real examples of SQL injection vulnerabilities affecting widely used products:

CVE-2017-8917 (Joomla! SQL Injection)

CVE-2020-8193 (Citrix ADC / NetScaler SQL Injection)

References

Wordfence vulnerability entry: https://www.wordfence.com/threat-intel/vulnerabilities/id/12ecb8ae-9aa3-4826-959e-cbac8eb5e76c

CVE record: https://www.cve.org/CVERecord?id=CVE-2026-23805

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers