The Custom css-js-php WordPress plugin through 2.0.7 does not properly sanitize user input before using it in a SQL query, and the result is passed to eval(), allowing unauthenticated users to execute arbitrary PHP code on the server.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 11 May 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Custom css-js-php WordPress plugin through 2.0.7 does not properly sanitize user input before using it in a SQL query, and the result is passed to eval(), allowing unauthenticated users to execute arbitrary PHP code on the server. | |
| Title | Custom CSS JS PHP <= 2.0.7 - Unauthenticated SQL Injection to RCE | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-05-11T06:00:01.278Z
Reserved: 2026-04-16T17:16:45.865Z
Link: CVE-2026-6433
No data.
Status : Received
Published: 2026-05-11T06:16:09.707
Modified: 2026-05-11T06:16:09.707
Link: CVE-2026-6433
No data.
OpenCVE Enrichment
No data.
Weaknesses
No weakness.