Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2232: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in wcproducttable Product Table and List Builder for WooCommerce Lite

0
High
VulnerabilityCVE-2026-2232cvecve-2026-2232cwe-89
Published: Thu Feb 19 2026 (02/19/2026, 16:24:56 UTC)
Source: CVE Database V5
Vendor/Project: wcproducttable
Product: Product Table and List Builder for WooCommerce Lite

Description

The Product Table and List Builder for WooCommerce Lite plugin for WordPress is vulnerable to time-based SQL Injection via the 'search' parameter in all versions up to, and including, 4.6.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database.

AI-Powered Analysis

AILast updated: 02/19/2026, 16:57:11 UTC

Technical Analysis

CVE-2026-2232 identifies a critical SQL Injection vulnerability (CWE-89) in the Product Table and List Builder for WooCommerce Lite plugin for WordPress, specifically in versions up to and including 4.6.2. The vulnerability stems from insufficient escaping and lack of prepared statements in handling the 'search' parameter, which is user-supplied input. This improper neutralization allows attackers to append arbitrary SQL code to existing queries, exploiting the database via time-based SQL Injection techniques. The attack vector is remote and requires no authentication or user interaction, making it highly accessible to threat actors. By exploiting this flaw, attackers can extract sensitive information from the underlying database, potentially including customer data, order details, or administrative credentials. The vulnerability does not impact data integrity or availability but poses a significant confidentiality risk. Despite no current public exploits, the plugin's popularity in the WooCommerce ecosystem and the ease of exploitation make this a critical concern. The CVSS v3.1 score of 7.5 reflects the high impact on confidentiality with low attack complexity and no privileges required. No official patches are currently linked, so users must monitor vendor updates or apply temporary mitigations. The vulnerability highlights the importance of secure coding practices such as parameterized queries and rigorous input validation in WordPress plugin development.

Potential Impact

The primary impact of CVE-2026-2232 is the unauthorized disclosure of sensitive information stored in the WordPress site's database. Attackers exploiting this vulnerability can extract customer data, order histories, payment information, and potentially administrative credentials, leading to privacy violations and compliance breaches (e.g., GDPR). Although the vulnerability does not allow modification or deletion of data, the exposure of confidential information can facilitate further attacks such as identity theft, fraud, or targeted phishing campaigns. Organizations relying on WooCommerce for e-commerce operations risk reputational damage, financial loss, and legal consequences if exploited. The ease of exploitation without authentication or user interaction increases the likelihood of automated scanning and exploitation attempts, especially on publicly accessible WordPress sites. The widespread use of WooCommerce and its plugins globally amplifies the potential scale of impact. Additionally, compromised sites may be used as pivot points for lateral movement within corporate networks or to distribute malware, further escalating the threat.

Mitigation Recommendations

To mitigate CVE-2026-2232, organizations should immediately verify whether their WordPress installations use the Product Table and List Builder for WooCommerce Lite plugin at or below version 4.6.2. If so, they should prioritize updating to a patched version once released by the vendor. In the absence of an official patch, temporary mitigations include disabling or removing the vulnerable plugin to eliminate the attack surface. Web application firewalls (WAFs) can be configured with custom rules to detect and block suspicious SQL injection payloads targeting the 'search' parameter. Additionally, implementing strict input validation and sanitization at the application level can reduce risk. Monitoring web server and database logs for anomalous query patterns or repeated failed requests can help detect exploitation attempts early. Organizations should also ensure that database user permissions follow the principle of least privilege, limiting the potential damage from successful injection attacks. Regular security audits and penetration testing focused on plugin vulnerabilities are recommended to proactively identify and remediate similar issues. Finally, educating development teams on secure coding practices, including the use of parameterized queries and prepared statements, will help prevent future vulnerabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-08T21:00:22.835Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699740bf3af16a0ef60c5452

Added to database: 2/19/2026, 4:56:31 PM

Last enriched: 2/19/2026, 4:57:11 PM

Last updated: 2/19/2026, 7:40:35 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats