CVE-2026-2019

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker with Administrator-level access to run any PHP code on the server, potentially taking full control of the website. It occurs because the plugin does not properly check the input in a specific field, making it easy for attackers to exploit it.

Technical Description

The Cart All In One For WooCommerce plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 1.1.21. This is due to insufficient input validation on the 'Assign page' field which is passed directly to the eval() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute arbitrary PHP code on the server.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredHigh
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$1,421($1K-$5K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Feb 18, 2026

about 2 months ago

Last Modified

Feb 18, 2026

about 2 months ago