Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0702: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpcreatix VidShop – Shoppable Videos for WooCommerce

0
High
VulnerabilityCVE-2026-0702cvecve-2026-0702cwe-89
Published: Wed Jan 28 2026 (01/28/2026, 08:26:55 UTC)
Source: CVE Database V5
Vendor/Project: wpcreatix
Product: VidShop – Shoppable Videos for WooCommerce

Description

CVE-2026-0702 is a high-severity SQL Injection vulnerability in the VidShop – Shoppable Videos for WooCommerce WordPress plugin, affecting all versions up to 1. 1. 4. The flaw arises from improper sanitization of the 'fields' parameter, allowing unauthenticated attackers to perform time-based SQL injection attacks. This enables attackers to extract sensitive database information without requiring authentication or user interaction. Although no known exploits are currently in the wild, the vulnerability's ease of exploitation and potential impact on confidentiality make it a significant risk. European organizations using this plugin on WooCommerce sites are at risk, especially those in countries with high WordPress adoption and e-commerce activity. Immediate patching or mitigation is critical to prevent data breaches. Defenders should implement strict input validation, web application firewalls, and monitor for suspicious database queries. Countries like Germany, the UK, France, and the Netherlands are likely most affected due to their large e-commerce sectors and WordPress usage.

AI-Powered Analysis

AILast updated: 01/28/2026, 09:05:34 UTC

Technical Analysis

CVE-2026-0702 is a vulnerability classified under CWE-89 (Improper Neutralization of Special Elements used in an SQL Command, commonly known as SQL Injection) found in the VidShop – Shoppable Videos for WooCommerce plugin for WordPress. This plugin, which enables shoppable video content integration into WooCommerce stores, suffers from insufficient escaping and lack of prepared statements in handling the 'fields' parameter. Specifically, all versions up to and including 1.1.4 fail to properly sanitize user-supplied input, allowing an unauthenticated attacker to inject malicious SQL code. The vulnerability is time-based, meaning attackers can infer data by measuring response delays caused by crafted SQL queries. Exploitation does not require any authentication or user interaction, increasing the attack surface. The impact is primarily on confidentiality, as attackers can extract sensitive database information such as customer data, product details, or credentials stored in the database. The CVSS v3.1 base score is 7.5, reflecting high severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. Although no public exploits are reported yet, the vulnerability's characteristics make it a prime target for attackers aiming to compromise WooCommerce stores using this plugin. The lack of available patches at the time of disclosure further elevates the risk. The vulnerability affects all versions of the plugin, indicating a need for urgent remediation or mitigation.

Potential Impact

For European organizations, particularly those operating e-commerce platforms using WordPress and WooCommerce, this vulnerability poses a significant risk of data breach. Sensitive customer information, including personal data and payment-related details, could be extracted, leading to privacy violations and regulatory non-compliance under GDPR. The compromise of database confidentiality can also damage brand reputation and customer trust. Since the attack requires no authentication, any exposed WooCommerce site with the vulnerable plugin is at risk from remote attackers. The potential for automated exploitation increases the threat to large-scale deployments. Additionally, the disruption caused by data leakage incidents could lead to financial losses and legal consequences. Organizations in Europe with high e-commerce activity and reliance on WordPress plugins are particularly vulnerable, necessitating immediate attention to this issue.

Mitigation Recommendations

1. Immediate upgrade: Monitor for official patches or updates from the plugin vendor and apply them as soon as they become available. 2. Temporary disablement: If no patch is available, consider disabling the VidShop plugin to eliminate the attack vector. 3. Input validation: Implement strict server-side validation and sanitization of all user inputs, especially the 'fields' parameter, using prepared statements or parameterized queries where possible. 4. Web Application Firewall (WAF): Deploy and configure a WAF with custom rules to detect and block SQL injection attempts targeting the vulnerable parameter. 5. Database monitoring: Enable logging and anomaly detection on database queries to identify suspicious time-based delays or unusual query patterns. 6. Access controls: Restrict database access permissions to the minimum necessary to limit potential data exposure. 7. Security audits: Conduct regular security assessments of WordPress plugins and dependencies to identify and remediate vulnerabilities proactively. 8. Backup and incident response: Maintain up-to-date backups and prepare incident response plans to quickly recover from potential breaches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-07T23:31:05.534Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6979cdf04623b1157ca477e8

Added to database: 1/28/2026, 8:50:56 AM

Last enriched: 1/28/2026, 9:05:34 AM

Last updated: 1/28/2026, 11:12:03 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats