๐Ÿ” CVE Alert

CVE-2026-9065

UNKNOWN 0.0

Surecart - SQL Injection

CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
8th

SureCart version prior to 4.2.1 are vulnerable to authenticated SQL injection via multiple parameters ('model_name', 'model_id', 'integration_id', 'provider') on the REST API endpoint '/surecart/v1/integrations/{id}'. The root cause is a flawed escaping bypass in the query builder ('wp-query-builder'). Values passed to the 'where()' method are only sanitized via '$wpdb->prepare()' when they do **not** contain a dot ('.') or the WordPress table prefix ('wp_'). By including a dot anywhere in the payload, an attacker completely bypasses the escaping logic and injects arbitrary SQL into the 'WHERE' clause, allowing full UNION-based extraction of the database.

CWE CWE-89
Vendor brainstormforce
Product surecart
Published May 20, 2026
Last Updated May 20, 2026
Stay Ahead of the Next One

Get instant alerts for brainstormforce surecart

Be the first to know when new unknown vulnerabilities affecting brainstormforce surecart are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

brainstormforce / Surecart
O < 4.2.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
tenable.com: https://www.tenable.com/security/research/tra-2026-43