Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-4004: CWE-94 Improper Control of Generation of Code ('Code Injection') in eoxia Task Manager

0
Medium
VulnerabilityCVE-2026-4004cvecve-2026-4004cwe-94
Published: Sat Mar 21 2026 (03/21/2026, 03:27:11 UTC)
Source: CVE Database V5
Vendor/Project: eoxia
Product: Task Manager

Description

The Task Manager plugin for WordPress is vulnerable to arbitrary shortcode execution via the 'search' AJAX action in all versions up to, and including, 3.0.2. This is due to missing capability checks in the callback_search() function and insufficient input validation that allows shortcode syntax (square brackets) to pass through sanitize_text_field() and be concatenated into a do_shortcode() call. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes on the site by injecting shortcode syntax into parameters like 'task_id', 'point_id', 'categories_id', or 'term'.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/21/2026, 04:20:02 UTC

Technical Analysis

The eoxia Task Manager plugin for WordPress, versions up to and including 3.0.2, contains a code injection vulnerability identified as CVE-2026-4004 (CWE-94). The vulnerability arises from the 'search' AJAX action's callback_search() function, which lacks proper capability checks and insufficiently validates input parameters. Specifically, parameters such as 'task_id', 'point_id', 'categories_id', and 'term' accept user input that passes through sanitize_text_field(), which does not remove shortcode syntax (square brackets). This input is then concatenated into a do_shortcode() call, enabling execution of arbitrary shortcodes. Since WordPress shortcodes can execute PHP code or trigger plugin/theme functionality, this can lead to unauthorized code execution. The vulnerability requires the attacker to be authenticated with at least Subscriber-level privileges, which is a low bar in many WordPress setups. The CVSS v3.1 base score is 6.5, reflecting medium severity, with network attack vector, low attack complexity, no user interaction, and no privileges required beyond authentication. Although no public exploits are known, the flaw poses a significant risk to site integrity and confidentiality, as malicious shortcodes could be used to manipulate site content, escalate privileges, or exfiltrate data. The vulnerability affects all versions of the plugin up to 3.0.2, and no official patches have been linked yet.

Potential Impact

This vulnerability allows authenticated low-privilege users to execute arbitrary shortcodes, which can lead to unauthorized code execution within the WordPress environment. The impact includes potential site defacement, data leakage, privilege escalation, or further compromise of the hosting server if malicious shortcodes invoke unsafe PHP functions or plugins. Since Subscriber-level access is commonly granted to registered users or commenters, many WordPress sites using this plugin are at risk. The integrity of site content and confidentiality of data can be compromised, undermining user trust and potentially violating data protection regulations. Availability impact is low as the vulnerability does not directly enable denial of service. However, successful exploitation could be a stepping stone for more severe attacks. Organizations relying on the eoxia Task Manager plugin face reputational damage and operational disruption if exploited.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict access to the affected AJAX 'search' action by implementing strict capability checks to ensure only trusted roles can invoke it. Input validation must be enhanced to sanitize or reject any shortcode syntax before passing parameters to do_shortcode(). Until an official patch is released, administrators can disable the plugin or remove the vulnerable AJAX handler via custom code or security plugins that filter AJAX requests. Monitoring logs for suspicious shortcode patterns in AJAX requests can help detect exploitation attempts. Additionally, limiting user registrations or subscriber privileges reduces the attack surface. Applying the principle of least privilege for user roles and regularly updating WordPress and plugins when patches become available are critical. Security teams should also consider implementing Web Application Firewalls (WAFs) with rules to block shortcode injection patterns in AJAX parameters.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-03-11T18:54:27.040Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69be1811f4197a8e3b7843f7

Added to database: 3/21/2026, 4:01:21 AM

Last enriched: 3/21/2026, 4:20:02 AM

Last updated: 3/22/2026, 7:18:27 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses