WordPress Geo Mashup Plugin SQLi via 'sort' Parameter (CVE-2026-4060)
The National Vulnerability Database has detailed CVE-2026-4060, a high-severity time-based SQL injection vulnerability affecting the Geo Mashup plugin for WordPress. This flaw, present in all versions up to and including 1.13.18, stems from insufficient escaping of the ‘sort’ parameter and inadequate preparation of existing SQL queries. An esc_sql() function is applied but proves ineffective within the ORDER BY context because the value is not properly quoted.
Critically, while version 1.13.18 introduced a sanitize_sort_arg() allowlist-based sanitizer, its implementation is limited. It’s only applied in the AJAX code path (sanitize_query_args()) and completely bypassed in the render-map.php and template tag code paths. This oversight creates a glaring blind spot for attackers.
This vulnerability allows unauthenticated attackers to append malicious SQL queries to existing ones. They can then exploit a time-based blind approach to extract sensitive information directly from the database. With a CVSS score of 7.5 (High), this is a critical weakness that site administrators cannot afford to ignore.
What This Means For You
- If your organization uses the WordPress Geo Mashup plugin, you are exposed. Unauthenticated attackers can silently siphon sensitive data. Immediately check if you are running Geo Mashup and ensure it is updated past version 1.13.18, or disable it if updates are not available. This isn't theoretical; it's a direct path to data exfiltration.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
WordPress Geo Mashup Plugin SQLi via 'sort' Parameter - CVE-2026-4060
title: WordPress Geo Mashup Plugin SQLi via 'sort' Parameter - CVE-2026-4060
id: scw-2026-05-02-ai-1
status: experimental
level: high
description: |
Detects time-based SQL injection attempts targeting the Geo Mashup plugin for WordPress (CVE-2026-4060). The vulnerability lies in the 'sort' parameter, which is not properly sanitized in certain code paths, allowing attackers to inject SQL commands. This rule looks for common SQL injection patterns like CASE, IF, or SLEEP functions within the 'sort' parameter in the URI query string.
author: SCW Feed Engine (AI-generated)
date: 2026-05-02
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-4060/
tags:
- attack.initial_access
- attack.t1190
logsource:
category: webserver
detection:
selection:
cs-uri-query|contains:
- 'sort=CASE'
- 'sort=IF'
- 'sort=SLEEP'
condition: selection
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-4060 | SQLi | Geo Mashup plugin for WordPress versions <= 1.13.18 |
| CVE-2026-4060 | SQLi | Vulnerable parameter: 'sort' |
| CVE-2026-4060 | SQLi | Vulnerable context: ORDER BY clause |
| CVE-2026-4060 | SQLi | Vulnerable files: render-map.php, template tag code paths |
| CVE-2026-4060 | SQLi | Attack vector: Unauthenticated time-based blind SQL injection |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 02, 2026 at 15:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.