CVE-2026-2296
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker with Shop Manager-level access or higher to run any PHP code on the server, which could lead to full control over the website. The issue arises from a lack of proper checks on user input in a specific plugin, enabling the attacker to manipulate the system by exploiting a feature meant for customizing product options.
Technical Description
The Product Addons for Woocommerce – Product Options with Custom Fields plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 3.1.0. This is due to insufficient input validation of the 'operator' field in conditional logic rules within the evalConditions() function, which passes unsanitized user input directly to PHP's eval() function. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to inject and execute arbitrary PHP code on the server via the conditional logic 'operator' parameter when saving addon form field rules.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 18, 2026
about 2 months ago
Last Modified
Feb 18, 2026
about 2 months ago