Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0702: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wpcreatix VidShop – Shoppable Videos for WooCommerce

0
High
VulnerabilityCVE-2026-0702cvecve-2026-0702cwe-89
Published: Wed Jan 28 2026 (01/28/2026, 08:26:55 UTC)
Source: CVE Database V5
Vendor/Project: wpcreatix
Product: VidShop – Shoppable Videos for WooCommerce

Description

CVE-2026-0702 is a high-severity SQL Injection vulnerability in the VidShop – Shoppable Videos for WooCommerce WordPress plugin, affecting all versions up to 1. 1. 4. It allows unauthenticated attackers to exploit the 'fields' parameter to perform time-based SQL Injection attacks, enabling extraction of sensitive database information without requiring user interaction or authentication. The vulnerability arises from improper sanitization and escaping of user input in SQL queries. Although no known exploits are currently reported in the wild, the ease of exploitation and potential data confidentiality impact make this a critical concern for WooCommerce sites using this plugin. European organizations using this plugin, especially those with e-commerce platforms, are at risk of data leakage. Mitigation requires immediate plugin updates once available or temporary disabling of the plugin. Countries with high WooCommerce adoption and significant e-commerce sectors, such as Germany, the UK, France, and the Netherlands, are most likely affected.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:22:14 UTC

Technical Analysis

CVE-2026-0702 identifies a time-based SQL Injection vulnerability in the VidShop – Shoppable Videos for WooCommerce plugin for WordPress, versions up to and including 1.1.4. The vulnerability stems from improper neutralization of special elements in the 'fields' parameter, which is directly incorporated into SQL queries without sufficient escaping or use of prepared statements. This flaw allows unauthenticated attackers to append malicious SQL code, enabling them to extract sensitive information from the underlying database through time-based inference techniques. The attack vector requires no authentication or user interaction, increasing the risk of automated exploitation. The vulnerability is classified under CWE-89, indicating a classic SQL Injection issue. The CVSS v3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, and no user interaction needed, with a significant impact on confidentiality but no impact on integrity or availability. While no public exploits are currently known, the widespread use of WooCommerce and the plugin’s functionality in e-commerce contexts make this a significant threat. The lack of a patch at the time of disclosure necessitates immediate attention from administrators to mitigate risk.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of sensitive data stored in the WordPress site's database, which may include customer information, order details, and potentially payment data depending on the database schema. For European organizations, this can lead to violations of GDPR due to unauthorized access to personal data, resulting in legal penalties and reputational damage. The vulnerability does not affect data integrity or availability directly but compromises confidentiality, which is critical for e-commerce platforms handling sensitive customer and transactional data. Exploitation can be automated and performed remotely without authentication, increasing the likelihood of attacks. The breach of sensitive data could facilitate further attacks such as identity theft, fraud, or targeted phishing campaigns against European customers. Additionally, compromised sites may lose customer trust and face financial losses. The impact is particularly severe for organizations relying on WooCommerce for their online sales and marketing, as the plugin is integral to their shopping video functionality.

Mitigation Recommendations

1. Immediate action should include disabling the VidShop – Shoppable Videos for WooCommerce plugin until a secure patch is released. 2. Monitor official vendor channels and WordPress plugin repositories for updates addressing CVE-2026-0702 and apply patches promptly. 3. Implement Web Application Firewall (WAF) rules to detect and block SQL Injection attempts targeting the 'fields' parameter, using signature-based and anomaly detection methods. 4. Conduct thorough audits of database access logs and application logs for unusual query patterns or time delays indicative of exploitation attempts. 5. Employ database user permissions with the principle of least privilege to limit the impact of any successful injection. 6. Harden WordPress installations by disabling unnecessary plugins and ensuring all other components are up to date. 7. Educate development and security teams on secure coding practices, emphasizing the use of parameterized queries and input validation. 8. Consider deploying runtime application self-protection (RASP) solutions to detect and block injection attacks in real time. 9. Prepare incident response plans specific to data breaches involving SQL Injection to minimize damage if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-07T23:31:05.534Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6979cdf04623b1157ca477e8

Added to database: 1/28/2026, 8:50:56 AM

Last enriched: 2/4/2026, 9:22:14 AM

Last updated: 2/7/2026, 12:41:33 PM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats