CVE-2026-4004: CWE-94 Improper Control of Generation of Code ('Code Injection') in eoxia Task Manager
The Task Manager plugin for WordPress is vulnerable to arbitrary shortcode execution via the 'search' AJAX action in all versions up to, and including, 3.0.2. This is due to missing capability checks in the callback_search() function and insufficient input validation that allows shortcode syntax (square brackets) to pass through sanitize_text_field() and be concatenated into a do_shortcode() call. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes on the site by injecting shortcode syntax into parameters like 'task_id', 'point_id', 'categories_id', or 'term'.
AI Analysis
Technical Summary
The eoxia Task Manager plugin for WordPress, versions up to and including 3.0.2, contains a code injection vulnerability identified as CVE-2026-4004 (CWE-94). The vulnerability arises from the 'search' AJAX action's callback_search() function, which lacks proper capability checks and insufficiently validates input parameters. Specifically, parameters such as 'task_id', 'point_id', 'categories_id', and 'term' accept user input that passes through sanitize_text_field(), which does not remove shortcode syntax (square brackets). This input is then concatenated into a do_shortcode() call, enabling execution of arbitrary shortcodes. Since WordPress shortcodes can execute PHP code or trigger plugin/theme functionality, this can lead to unauthorized code execution. The vulnerability requires the attacker to be authenticated with at least Subscriber-level privileges, which is a low bar in many WordPress setups. The CVSS v3.1 base score is 6.5, reflecting medium severity, with network attack vector, low attack complexity, no user interaction, and no privileges required beyond authentication. Although no public exploits are known, the flaw poses a significant risk to site integrity and confidentiality, as malicious shortcodes could be used to manipulate site content, escalate privileges, or exfiltrate data. The vulnerability affects all versions of the plugin up to 3.0.2, and no official patches have been linked yet.
Potential Impact
This vulnerability allows authenticated low-privilege users to execute arbitrary shortcodes, which can lead to unauthorized code execution within the WordPress environment. The impact includes potential site defacement, data leakage, privilege escalation, or further compromise of the hosting server if malicious shortcodes invoke unsafe PHP functions or plugins. Since Subscriber-level access is commonly granted to registered users or commenters, many WordPress sites using this plugin are at risk. The integrity of site content and confidentiality of data can be compromised, undermining user trust and potentially violating data protection regulations. Availability impact is low as the vulnerability does not directly enable denial of service. However, successful exploitation could be a stepping stone for more severe attacks. Organizations relying on the eoxia Task Manager plugin face reputational damage and operational disruption if exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict access to the affected AJAX 'search' action by implementing strict capability checks to ensure only trusted roles can invoke it. Input validation must be enhanced to sanitize or reject any shortcode syntax before passing parameters to do_shortcode(). Until an official patch is released, administrators can disable the plugin or remove the vulnerable AJAX handler via custom code or security plugins that filter AJAX requests. Monitoring logs for suspicious shortcode patterns in AJAX requests can help detect exploitation attempts. Additionally, limiting user registrations or subscriber privileges reduces the attack surface. Applying the principle of least privilege for user roles and regularly updating WordPress and plugins when patches become available are critical. Security teams should also consider implementing Web Application Firewalls (WAFs) with rules to block shortcode injection patterns in AJAX parameters.
Affected Countries
United States, Germany, United Kingdom, France, Canada, Australia, India, Brazil, Japan, Netherlands
CVE-2026-4004: CWE-94 Improper Control of Generation of Code ('Code Injection') in eoxia Task Manager
Description
The Task Manager plugin for WordPress is vulnerable to arbitrary shortcode execution via the 'search' AJAX action in all versions up to, and including, 3.0.2. This is due to missing capability checks in the callback_search() function and insufficient input validation that allows shortcode syntax (square brackets) to pass through sanitize_text_field() and be concatenated into a do_shortcode() call. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes on the site by injecting shortcode syntax into parameters like 'task_id', 'point_id', 'categories_id', or 'term'.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The eoxia Task Manager plugin for WordPress, versions up to and including 3.0.2, contains a code injection vulnerability identified as CVE-2026-4004 (CWE-94). The vulnerability arises from the 'search' AJAX action's callback_search() function, which lacks proper capability checks and insufficiently validates input parameters. Specifically, parameters such as 'task_id', 'point_id', 'categories_id', and 'term' accept user input that passes through sanitize_text_field(), which does not remove shortcode syntax (square brackets). This input is then concatenated into a do_shortcode() call, enabling execution of arbitrary shortcodes. Since WordPress shortcodes can execute PHP code or trigger plugin/theme functionality, this can lead to unauthorized code execution. The vulnerability requires the attacker to be authenticated with at least Subscriber-level privileges, which is a low bar in many WordPress setups. The CVSS v3.1 base score is 6.5, reflecting medium severity, with network attack vector, low attack complexity, no user interaction, and no privileges required beyond authentication. Although no public exploits are known, the flaw poses a significant risk to site integrity and confidentiality, as malicious shortcodes could be used to manipulate site content, escalate privileges, or exfiltrate data. The vulnerability affects all versions of the plugin up to 3.0.2, and no official patches have been linked yet.
Potential Impact
This vulnerability allows authenticated low-privilege users to execute arbitrary shortcodes, which can lead to unauthorized code execution within the WordPress environment. The impact includes potential site defacement, data leakage, privilege escalation, or further compromise of the hosting server if malicious shortcodes invoke unsafe PHP functions or plugins. Since Subscriber-level access is commonly granted to registered users or commenters, many WordPress sites using this plugin are at risk. The integrity of site content and confidentiality of data can be compromised, undermining user trust and potentially violating data protection regulations. Availability impact is low as the vulnerability does not directly enable denial of service. However, successful exploitation could be a stepping stone for more severe attacks. Organizations relying on the eoxia Task Manager plugin face reputational damage and operational disruption if exploited.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict access to the affected AJAX 'search' action by implementing strict capability checks to ensure only trusted roles can invoke it. Input validation must be enhanced to sanitize or reject any shortcode syntax before passing parameters to do_shortcode(). Until an official patch is released, administrators can disable the plugin or remove the vulnerable AJAX handler via custom code or security plugins that filter AJAX requests. Monitoring logs for suspicious shortcode patterns in AJAX requests can help detect exploitation attempts. Additionally, limiting user registrations or subscriber privileges reduces the attack surface. Applying the principle of least privilege for user roles and regularly updating WordPress and plugins when patches become available are critical. Security teams should also consider implementing Web Application Firewalls (WAFs) with rules to block shortcode injection patterns in AJAX parameters.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-03-11T18:54:27.040Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69be1811f4197a8e3b7843f7
Added to database: 3/21/2026, 4:01:21 AM
Last enriched: 3/21/2026, 4:20:02 AM
Last updated: 3/22/2026, 7:18:27 AM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.