High severity7.2NVD Advisory· Published Feb 18, 2026· Updated Apr 15, 2026
CVE-2026-2296
CVE-2026-2296
Description
The Product Addons for Woocommerce – Product Options with Custom Fields plugin for WordPress is vulnerable to Code Injection in all versions up to, and including, 3.1.0. This is due to insufficient input validation of the 'operator' field in conditional logic rules within the evalConditions() function, which passes unsanitized user input directly to PHP's eval() function. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to inject and execute arbitrary PHP code on the server via the conditional logic 'operator' parameter when saving addon form field rules.
Affected products
1- Range: <=3.1.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6- plugins.trac.wordpress.org/browser/woo-custom-product-addons/tags/3.0.19/includes/process/conditional-logic.phpnvd
- plugins.trac.wordpress.org/browser/woo-custom-product-addons/tags/3.0.19/includes/process/conditional-logic.phpnvd
- plugins.trac.wordpress.org/browser/woo-custom-product-addons/trunk/includes/process/conditional-logic.phpnvd
- plugins.trac.wordpress.org/browser/woo-custom-product-addons/trunk/includes/process/conditional-logic.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/b3c1edd7-2421-4dfa-8775-ca0497759d52nvd
News mentions
0No linked articles in our index yet.