CVE-2026-25366
Published: 25 March 2026
Summary
CVE-2026-25366 is a critical-severity Code Injection (CWE-94) vulnerability. Its CVSS base score is 9.9 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 18.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-10 directly prevents code injection by requiring validation and sanitization of inputs to the PHP snippet insertion feature in the Woody ad snippets plugin.
SI-2 mandates timely patching and remediation of the known code injection flaw in Woody ad snippets versions through 2.7.1.
CM-7 reduces the attack surface by disabling unnecessary functionality such as the vulnerable PHP code insertion capability in the plugin.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
CVE describes unauthenticated RCE via code injection in public-facing WordPress plugin (T1190); achieved RCE directly permits arbitrary command execution through the server's scripting interpreter (T1059.004 Unix Shell); low-privileged access escalates to full system impact via scope change (T1068).
NVD Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Themeisle Woody ad snippets insert-php allows Code Injection.This issue affects Woody ad snippets: from n/a through <= 2.7.1.
Deeper analysisAI
CVE-2026-25366 is an Improper Control of Generation of Code ('Code Injection') vulnerability, classified under CWE-94, in the Themeisle Woody ad snippets insert-php WordPress plugin. This issue affects versions from n/a through 2.7.1 and was published on 2026-03-25.
The vulnerability carries a CVSS v3.1 base score of 9.9 (Critical), with vector AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H. A low-privileged remote attacker (PR:L) can exploit it over the network with low complexity and no user interaction, achieving a scope change that results in high impacts to confidentiality, integrity, and availability, enabling remote code execution.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/insert-php/vulnerability/wordpress-woody-ad-snippets-plugin-2-7-1-remote-code-execution-rce-vulnerability?_s_id=cve details this remote code execution vulnerability in Woody ad snippets plugin version 2.7.1; practitioners should review it for mitigation guidance.
Details
- CWE(s)