Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2019: CWE-74 Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') in villatheme Cart All In One For WooCommerce

0
High
VulnerabilityCVE-2026-2019cvecve-2026-2019cwe-74
Published: Wed Feb 18 2026 (02/18/2026, 06:42:39 UTC)
Source: CVE Database V5
Vendor/Project: villatheme
Product: Cart All In One For WooCommerce

Description

The Cart All In One For WooCommerce plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 1.1.21. This is due to insufficient input validation on the 'Assign page' field which is passed directly to the eval() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to execute arbitrary PHP code on the server.

AI-Powered Analysis

AILast updated: 02/18/2026, 07:30:06 UTC

Technical Analysis

CVE-2026-2019 is a code injection vulnerability categorized under CWE-74 (Improper Neutralization of Special Elements in Output Used by a Downstream Component) found in the Cart All In One For WooCommerce plugin for WordPress. The vulnerability exists in all versions up to and including 1.1.21 due to insufficient input validation on the 'Assign page' field. This field's input is passed directly to the PHP eval() function, which executes the input as PHP code. Because eval() executes arbitrary PHP code, an attacker with authenticated Administrator-level access or higher can inject and execute malicious PHP code on the server hosting the WordPress site. This can lead to full server compromise, including data theft, website defacement, installation of backdoors, or pivoting to other network systems. The vulnerability requires high privileges (Administrator or above) but does not require user interaction, and the attack can be performed remotely over the network. The CVSS v3.1 score is 7.2, reflecting high impact on confidentiality, integrity, and availability, with low attack complexity and no user interaction needed. No patches or exploit code are currently publicly available, but the vulnerability's nature makes it a critical concern for affected sites. The plugin is widely used in WooCommerce environments, which are popular in e-commerce platforms worldwide, including Europe.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially for those operating e-commerce websites using WooCommerce with the Cart All In One plugin. Successful exploitation can lead to complete server compromise, resulting in theft of sensitive customer data (including payment information), disruption of online sales, reputational damage, and potential regulatory penalties under GDPR for data breaches. The ability to execute arbitrary PHP code allows attackers to install malware, create persistent backdoors, or manipulate website content, severely affecting business continuity. Given the widespread use of WooCommerce in European markets, particularly in countries with mature e-commerce sectors, the risk extends to a broad range of small to medium enterprises and larger retailers. The vulnerability's requirement for administrator-level access somewhat limits exploitation to insiders or attackers who have already compromised lower-level accounts, but privilege escalation or credential theft could facilitate this. The lack of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, as weaponization could occur rapidly once details are publicized.

Mitigation Recommendations

1. Immediate removal or disabling of the Cart All In One For WooCommerce plugin until a patched version is released. 2. Restrict administrator access strictly to trusted personnel and enforce strong authentication mechanisms, including multi-factor authentication (MFA). 3. Conduct regular audits of administrator accounts and monitor logs for suspicious activity indicative of privilege misuse or code injection attempts. 4. Implement Web Application Firewall (WAF) rules to detect and block attempts to inject PHP code via the 'Assign page' field or other plugin inputs. 5. Use security plugins that can detect unauthorized changes to PHP files or unusual code execution patterns. 6. Keep WordPress core, themes, and all plugins updated to their latest versions to reduce exposure to known vulnerabilities. 7. Employ principle of least privilege for all user roles to minimize the risk of privilege escalation. 8. Prepare incident response plans specific to web application compromise scenarios to enable rapid containment and recovery. 9. Once a patch is available, apply it promptly and verify the fix through testing in a staging environment before production deployment.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-05T19:59:32.753Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6995672780d747be204d2945

Added to database: 2/18/2026, 7:15:51 AM

Last enriched: 2/18/2026, 7:30:06 AM

Last updated: 2/20/2026, 11:41:34 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats