CVE-2026-0702: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpcreatix VidShop – Shoppable Videos for WooCommerce
CVE-2026-0702 is a high-severity SQL Injection vulnerability in the VidShop – Shoppable Videos for WooCommerce WordPress plugin, affecting all versions up to 1. 1. 4. It allows unauthenticated attackers to exploit the 'fields' parameter to perform time-based SQL Injection attacks, enabling extraction of sensitive database information without requiring user interaction or authentication. The vulnerability arises from improper sanitization and escaping of user input in SQL queries. Although no known exploits are currently reported in the wild, the ease of exploitation and potential data confidentiality impact make this a critical concern for WooCommerce sites using this plugin. European organizations using this plugin, especially those with e-commerce platforms, are at risk of data leakage. Mitigation requires immediate plugin updates once available or temporary disabling of the plugin. Countries with high WooCommerce adoption and significant e-commerce sectors, such as Germany, the UK, France, and the Netherlands, are most likely affected.
AI Analysis
Technical Summary
CVE-2026-0702 identifies a time-based SQL Injection vulnerability in the VidShop – Shoppable Videos for WooCommerce plugin for WordPress, versions up to and including 1.1.4. The vulnerability stems from improper neutralization of special elements in the 'fields' parameter, which is directly incorporated into SQL queries without sufficient escaping or use of prepared statements. This flaw allows unauthenticated attackers to append malicious SQL code, enabling them to extract sensitive information from the underlying database through time-based inference techniques. The attack vector requires no authentication or user interaction, increasing the risk of automated exploitation. The vulnerability is classified under CWE-89, indicating a classic SQL Injection issue. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed, with a significant impact on confidentiality but no impact on integrity or availability. While no public exploits are currently known, the widespread use of WooCommerce and the plugin’s functionality in e-commerce contexts make this a significant threat. The lack of a patch at the time of disclosure necessitates immediate attention from administrators to mitigate risk.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive data stored in the WordPress site's database, which may include customer information, order details, and potentially payment data depending on the database schema. For European organizations, this can lead to violations of GDPR due to unauthorized access to personal data, resulting in legal penalties and reputational damage. The vulnerability does not affect data integrity or availability directly but compromises confidentiality, which is critical for e-commerce platforms handling sensitive customer and transactional data. Exploitation can be automated and performed remotely without authentication, increasing the likelihood of attacks. The breach of sensitive data could facilitate further attacks such as identity theft, fraud, or targeted phishing campaigns against European customers. Additionally, compromised sites may lose customer trust and face financial losses. The impact is particularly severe for organizations relying on WooCommerce for their online sales and marketing, as the plugin is integral to their shopping video functionality.
Mitigation Recommendations
1. Immediate action should include disabling the VidShop – Shoppable Videos for WooCommerce plugin until a secure patch is released. 2. Monitor official vendor channels and WordPress plugin repositories for updates addressing CVE-2026-0702 and apply patches promptly. 3. Implement Web Application Firewall (WAF) rules to detect and block SQL Injection attempts targeting the 'fields' parameter, using signature-based and anomaly detection methods. 4. Conduct thorough audits of database access logs and application logs for unusual query patterns or time delays indicative of exploitation attempts. 5. Employ database user permissions with the principle of least privilege to limit the impact of any successful injection. 6. Harden WordPress installations by disabling unnecessary plugins and ensuring all other components are up to date. 7. Educate development and security teams on secure coding practices, emphasizing the use of parameterized queries and input validation. 8. Consider deploying runtime application self-protection (RASP) solutions to detect and block injection attacks in real time. 9. Prepare incident response plans specific to data breaches involving SQL Injection to minimize damage if exploitation occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2026-0702: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpcreatix VidShop – Shoppable Videos for WooCommerce
Description
CVE-2026-0702 is a high-severity SQL Injection vulnerability in the VidShop – Shoppable Videos for WooCommerce WordPress plugin, affecting all versions up to 1. 1. 4. It allows unauthenticated attackers to exploit the 'fields' parameter to perform time-based SQL Injection attacks, enabling extraction of sensitive database information without requiring user interaction or authentication. The vulnerability arises from improper sanitization and escaping of user input in SQL queries. Although no known exploits are currently reported in the wild, the ease of exploitation and potential data confidentiality impact make this a critical concern for WooCommerce sites using this plugin. European organizations using this plugin, especially those with e-commerce platforms, are at risk of data leakage. Mitigation requires immediate plugin updates once available or temporary disabling of the plugin. Countries with high WooCommerce adoption and significant e-commerce sectors, such as Germany, the UK, France, and the Netherlands, are most likely affected.
AI-Powered Analysis
Technical Analysis
CVE-2026-0702 identifies a time-based SQL Injection vulnerability in the VidShop – Shoppable Videos for WooCommerce plugin for WordPress, versions up to and including 1.1.4. The vulnerability stems from improper neutralization of special elements in the 'fields' parameter, which is directly incorporated into SQL queries without sufficient escaping or use of prepared statements. This flaw allows unauthenticated attackers to append malicious SQL code, enabling them to extract sensitive information from the underlying database through time-based inference techniques. The attack vector requires no authentication or user interaction, increasing the risk of automated exploitation. The vulnerability is classified under CWE-89, indicating a classic SQL Injection issue. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed, with a significant impact on confidentiality but no impact on integrity or availability. While no public exploits are currently known, the widespread use of WooCommerce and the plugin’s functionality in e-commerce contexts make this a significant threat. The lack of a patch at the time of disclosure necessitates immediate attention from administrators to mitigate risk.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of sensitive data stored in the WordPress site's database, which may include customer information, order details, and potentially payment data depending on the database schema. For European organizations, this can lead to violations of GDPR due to unauthorized access to personal data, resulting in legal penalties and reputational damage. The vulnerability does not affect data integrity or availability directly but compromises confidentiality, which is critical for e-commerce platforms handling sensitive customer and transactional data. Exploitation can be automated and performed remotely without authentication, increasing the likelihood of attacks. The breach of sensitive data could facilitate further attacks such as identity theft, fraud, or targeted phishing campaigns against European customers. Additionally, compromised sites may lose customer trust and face financial losses. The impact is particularly severe for organizations relying on WooCommerce for their online sales and marketing, as the plugin is integral to their shopping video functionality.
Mitigation Recommendations
1. Immediate action should include disabling the VidShop – Shoppable Videos for WooCommerce plugin until a secure patch is released. 2. Monitor official vendor channels and WordPress plugin repositories for updates addressing CVE-2026-0702 and apply patches promptly. 3. Implement Web Application Firewall (WAF) rules to detect and block SQL Injection attempts targeting the 'fields' parameter, using signature-based and anomaly detection methods. 4. Conduct thorough audits of database access logs and application logs for unusual query patterns or time delays indicative of exploitation attempts. 5. Employ database user permissions with the principle of least privilege to limit the impact of any successful injection. 6. Harden WordPress installations by disabling unnecessary plugins and ensuring all other components are up to date. 7. Educate development and security teams on secure coding practices, emphasizing the use of parameterized queries and input validation. 8. Consider deploying runtime application self-protection (RASP) solutions to detect and block injection attacks in real time. 9. Prepare incident response plans specific to data breaches involving SQL Injection to minimize damage if exploitation occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-07T23:31:05.534Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6979cdf04623b1157ca477e8
Added to database: 1/28/2026, 8:50:56 AM
Last enriched: 2/4/2026, 9:22:14 AM
Last updated: 2/7/2026, 12:41:33 PM
Views: 44
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.