Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22390: Improper Control of Generation of Code ('Code Injection') in Builderall Builderall Builder for WordPress

0
Unknown
VulnerabilityCVE-2026-22390cvecve-2026-22390
Published: Thu Mar 05 2026 (03/05/2026, 05:53:33 UTC)
Source: CVE Database V5
Vendor/Project: Builderall
Product: Builderall Builder for WordPress

Description

Improper Control of Generation of Code ('Code Injection') vulnerability in Builderall Builderall Builder for WordPress builderall-cheetah-for-wp allows Code Injection.This issue affects Builderall Builder for WordPress: from n/a through <= 3.0.1.

AI-Powered Analysis

AILast updated: 03/05/2026, 08:56:45 UTC

Technical Analysis

CVE-2026-22390 identifies a critical security vulnerability in the Builderall Builder for WordPress plugin (versions up to 3.0.1). The vulnerability is classified as 'Improper Control of Generation of Code,' commonly referred to as code injection. This means that the plugin fails to properly sanitize or control the input that is used to generate executable code, allowing an attacker to inject malicious code into the WordPress environment. Such injected code can be executed with the privileges of the web server or the WordPress application, potentially leading to full site compromise. The vulnerability affects all installations using the affected versions of the plugin, which is used to build and manage WordPress sites. Although no known exploits are currently active in the wild, the nature of code injection vulnerabilities makes them highly attractive targets for attackers, as they can lead to remote code execution, data theft, defacement, or pivoting within the network. The vulnerability was reserved in early 2026 and published in March 2026, but no official patch or CVSS score has been released yet. The absence of a CVSS score requires an independent severity assessment based on the impact and exploitability characteristics.

Potential Impact

The impact of this vulnerability is potentially severe for organizations worldwide using Builderall Builder for WordPress. Successful exploitation can lead to remote code execution, allowing attackers to run arbitrary commands on the affected server. This can result in unauthorized access to sensitive data, defacement of websites, installation of backdoors or malware, and lateral movement within the victim's network. For e-commerce, financial, or data-sensitive websites, this could mean significant data breaches, loss of customer trust, and regulatory penalties. The availability of the website could also be disrupted, causing business interruptions. Since WordPress powers a large portion of the web and Builderall is a popular builder plugin, the scope of affected systems is broad. The ease of exploitation is likely moderate to high because code injection vulnerabilities often do not require complex conditions or authentication, though specific details on exploitation vectors are not provided. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the potential for future attacks once exploit code becomes public.

Mitigation Recommendations

Organizations should immediately inventory their WordPress installations to identify the use of Builderall Builder for WordPress plugin versions up to 3.0.1. Until an official patch is released, administrators should consider disabling or removing the plugin if feasible. Implement strict input validation and sanitization on all user inputs related to the plugin to reduce injection risk. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious payloads targeting the plugin's code generation functionality. Monitor logs for unusual activity or attempts to inject code. Limit plugin management permissions to trusted administrators only. Regularly back up WordPress sites and databases to enable quick recovery in case of compromise. Stay informed about updates from the vendor and apply patches promptly once available. Additionally, consider isolating WordPress environments and applying the principle of least privilege to reduce the impact of potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-07T12:21:40.879Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69a92041d1a09e29cbe696e8

Added to database: 3/5/2026, 6:18:41 AM

Last enriched: 3/5/2026, 8:56:45 AM

Last updated: 3/5/2026, 3:05:00 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses