Product Addons for Woocommerce – Product Options with Custom Fields…

Product Addons for Woocommerce – Product Options with Custom Fields…

by | Feb 17, 2026 | Plugins

Attack Vectors

CVE-2026-2296 is a High severity vulnerability (CVSS 7.2) affecting the WordPress plugin Product Addons for Woocommerce – Product Options with Custom Fields (slug: woo-custom-product-addons) in versions up to and including 3.1.0.

The primary attack vector is an authenticated user with Shop Manager-level access or higher. An attacker in that role can target the plugin’s conditional logic rules by manipulating the “operator” parameter when saving addon form fields, potentially enabling code injection.

For business leaders, the key takeaway is that this is not a “drive-by” public exploit requiring no access—however, it is still a serious risk because many organizations grant Shop Manager access to multiple staff, contractors, agencies, or third-party integrators. Any compromised credentials in that permission tier could be used to trigger the issue.

Security Weakness

The weakness described for CVE-2026-2296 is insufficient input validation of the conditional logic operator field inside the plugin’s evalConditions() function. Reported details indicate the plugin passes unsanitized input into PHP’s eval(), which can allow an attacker to inject and run unintended code.

From a governance and compliance perspective, this is an access-control and secure-coding failure: a trusted administrative workflow (saving product addon settings) becomes a path to execute server-side actions that were never intended. Because the vulnerability requires Shop Manager+ privileges, it also highlights the importance of least-privilege role assignments and strong credential controls for eCommerce operations.

Remediation: Update Product Addons for Woocommerce – Product Options with Custom Fields to version 3.1.1 or newer, as recommended by the source advisory.

Technical or Business Impacts

If exploited, this vulnerability can enable arbitrary PHP code execution on the server hosting your WordPress and WooCommerce environment. In business terms, that can translate into a high-likelihood pathway for a full site compromise, depending on what the attacker deploys after gaining execution.

Potential impacts include data exposure (customer records, order history, internal operational data), data tampering (pricing, product content, checkout behavior), and service disruption (site downtime or degraded performance). Because this affects an eCommerce plugin, the downstream consequences often include lost revenue, brand damage, and higher customer support costs.

For CFO and compliance stakeholders, the risk can also include incident response costs, potential notification obligations depending on what data is accessed, and increased scrutiny from partners or payment-related stakeholders. Given the High severity rating, organizations should treat patching as time-sensitive and review who holds Shop Manager permissions—especially third parties.

Similar Attacks

While CVE-2026-2296 specifically involves authenticated code injection tied to unsafe evaluation of input, it fits a broader pattern of WordPress ecosystem incidents where plugin weaknesses lead to site takeover, malware injection, or business disruption.

Examples of real-world, widely reported WordPress-related attack activity and campaigns include:

Wordfence: Reports on large-scale WordPress mass exploitation campaigns

BleepingComputer: WordPress sites hacked via WooCommerce-related plugin vulnerability reporting

Sucuri Blog: Ongoing real-world WordPress malware and compromise case reports

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers