The BetterDocs Pro plugin for WordPress is vulnerable to SQL Injection via the `get_current_letter_docs` and `docs_sort_by_letter` AJAX actions in all versions up to, and including, 3.7.0. This is due to the `limit` POST parameter being interpolated directly into a SQL query string before being passed to `$wpdb->prepare()`, which only parameterizes other variables. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The Encyclopedia feature must be enabled in BetterDocs Pro settings for the vulnerability to be exploitable.
History

Thu, 07 May 2026 21:45:00 +0000

Type Values Removed Values Added
First Time appeared Betterdocs
Betterdocs betterdocs Pro
Wordpress
Wordpress wordpress
Vendors & Products Betterdocs
Betterdocs betterdocs Pro
Wordpress
Wordpress wordpress

Thu, 07 May 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 07 May 2026 05:30:00 +0000

Type Values Removed Values Added
Description The BetterDocs Pro plugin for WordPress is vulnerable to SQL Injection via the `get_current_letter_docs` and `docs_sort_by_letter` AJAX actions in all versions up to, and including, 3.7.0. This is due to the `limit` POST parameter being interpolated directly into a SQL query string before being passed to `$wpdb->prepare()`, which only parameterizes other variables. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database. The Encyclopedia feature must be enabled in BetterDocs Pro settings for the vulnerability to be exploitable.
Title BetterDocs Pro <= 3.7.0 - Unauthenticated SQL Injection via Encyclopedia 'limit' Parameter
Weaknesses CWE-89
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2026-05-07T04:27:09.916Z

Updated: 2026-05-07T13:48:52.345Z

Reserved: 2026-03-17T16:48:44.143Z

Link: CVE-2026-4348

cve-icon Vulnrichment

Updated: 2026-05-07T13:48:46.308Z

cve-icon NVD

Status : Deferred

Published: 2026-05-07T06:16:05.240

Modified: 2026-05-07T14:00:05.650

Link: CVE-2026-4348

cve-icon Redhat

No data.