Cart All In One For WooCommerce Vulnerability (High) – CVE-2026-2019

Cart All In One For WooCommerce Vulnerability (High) – CVE-2026-2019

by | Feb 17, 2026 | Plugins

Attack Vectors

The vulnerability (CVE-2026-2019) affects the WordPress plugin Cart All In One For WooCommerce (slug: woo-cart-all-in-one) in versions 1.1.21 and below and is rated High severity (CVSS 7.2).

Exploitation requires an authenticated user with Administrator-level access or higher. In practical business terms, this means the most likely paths are compromised admin credentials (phishing, reused passwords, stolen sessions), an insider threat, or another vulnerability that first grants elevated privileges.

The attack is performed through the plugin’s “Assign page” setting (sc_assign_page), where a malicious value can be entered and then executed on the server.

Security Weakness

The core weakness is insufficient input validation on the sc_assign_page setting. According to the published advisory, the value is passed directly into PHP’s eval(), which can cause user-supplied content to be interpreted as executable code.

Because this is a code injection issue, the impact is not limited to a single page or feature. If an attacker reaches the affected setting with Administrator+ access, they can potentially run arbitrary PHP on the underlying server.

Technical or Business Impacts

Operational disruption: Arbitrary code execution can enable site defacement, outages, or destructive changes that interrupt eCommerce revenue and campaign performance.

Data exposure risk: Depending on what the attacker executes, sensitive information may be accessed, including customer data, order history, or system configuration details—creating potential notification, contractual, and regulatory consequences.

Financial and brand impact: Incident response costs, lost sales during downtime, chargebacks, and reputational harm can follow a public compromise—especially for brands running paid acquisition and high-traffic promotions.

Compliance pressure: A server-side compromise may trigger reviews tied to internal controls, third-party risk requirements, and any applicable privacy or security obligations.

Remediation

Update immediately: Upgrade Cart All In One For WooCommerce to version 1.1.22 or a newer patched release. This is the vendor-recommended fix for CVE-2026-2019.

Reduce exposure of admin accounts: Because exploitation requires Administrator+ access, prioritize strong authentication for privileged users (unique passwords, MFA where possible), and limit the number of accounts with admin privileges to only those who truly need it.

Audit and monitoring: Review recent admin activity and plugin settings changes, and monitor for unexpected site behavior after patching. If compromise is suspected, follow your incident response process and consider a professional investigation.

Reference: CVE-2026-2019 and the published advisory source: Wordfence vulnerability record.

Similar Attacks

Server-side code execution vulnerabilities in web applications have been used in major real-world incidents. Examples include:

Log4Shell (Log4j) — widespread remote code execution exploitation
MOVEit Transfer — exploitation leading to large-scale data theft
Microsoft Exchange Server vulnerabilities — web shell deployment and data access

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers