Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 29 Apr 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Tue, 14 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 08 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Syed Balkhi
Syed Balkhi user Feedback Wordpress Wordpress wordpress |
|
| Vendors & Products |
Syed Balkhi
Syed Balkhi user Feedback Wordpress Wordpress wordpress |
Wed, 08 Apr 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Syed Balkhi User Feedback userfeedback-lite allows Blind SQL Injection.This issue affects User Feedback: from n/a through <= 1.10.1. | |
| Title | WordPress User Feedback plugin <= 1.10.1 - SQL Injection vulnerability | |
| Weaknesses | CWE-89 | |
| References |
|
Status: PUBLISHED
Assigner: Patchstack
Published:
Updated: 2026-04-29T09:52:01.836Z
Reserved: 2026-04-07T10:42:07.235Z
Link: CVE-2026-39475
Updated: 2026-04-14T14:09:32.150Z
Status : Deferred
Published: 2026-04-08T09:16:22.257
Modified: 2026-04-29T10:17:23.867
Link: CVE-2026-39475
No data.
OpenCVE Enrichment
Updated: 2026-04-29T12:00:11Z