WordPress website owners should take immediate action to address a critical SQL Injection vulnerability in the WP Database Administrator Plugin. This security flaw poses severe risks to WordPress security, potentially allowing a malicious actor to directly interact with the website’s database, leading to data theft and other malicious activities.

The vulnerability was discovered and responsibly reported by Christiaan Swiers, emphasizing the significance of proactive security practices in the WordPress ecosystem.


The SQL Injection vulnerability in the WP Database Administrator Plugin has been rated with critical severity, boasting a CVSS 3.1 score of 9.3.

Affected Versions:

Website owners using any version of the WP Database Administrator Plugin are susceptible to this vulnerability. As of now, there is no patched version available.


Exploiting this SQL Injection vulnerability allows a malicious actor to directly interact with your website’s database. The potential consequences include:

  • Stealing sensitive information stored in the database, such as user credentials and personal data.
  • Manipulating or deleting data in the database, leading to data loss or website malfunction.
  • Gaining unauthorized access to critical areas of the website.


Given the critical severity of this vulnerability and the absence of a patched version, website owners must take the following steps immediately:

  1. Uninstall the Plugin: Considering the severity and the unavailability of a fix, the safest course of action is to immediately uninstall the WP Database Administrator Plugin from the WordPress website.
  2. Database Backup: Before uninstalling the plugin, perform a comprehensive backup of the website’s database to ensure you have a restorable version in case of any data loss.
  3. Regular Security Audits: Conduct regular security audits to identify and address any potential vulnerabilities in WordPress plugins and themes.
  4. Monitor Security Notices: Stay informed about security notices and updates from plugin developers, security researchers, and the WordPress community.