Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 27 Jan 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Mon, 26 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 26 Jan 2026 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 | |
| Metrics |
cvssV3_1
|
Mon, 26 Jan 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Recipe Card Blocks Lite WordPress plugin before 3.4.13 does not sanitize and escape a parameter before using it in a SQL statement, allowing contributors and above to perform SQL injection attacks. | |
| Title | Recipe Card Blocks < 3.4.13 - Contributor+ SQLi | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-01-26T15:07:18.359Z
Reserved: 2025-12-19T15:07:18.554Z
Link: CVE-2025-14973
Updated: 2026-01-26T15:04:32.689Z
Status : Deferred
Published: 2026-01-26T07:16:06.673
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-14973
No data.
OpenCVE Enrichment
Updated: 2026-01-27T09:03:39Z