Cyber Posture

CVE-2026-32573

CriticalRCE

Published: 25 March 2026

Published
25 March 2026
Modified
24 April 2026
KEV Added
Patch
CVSS Score 9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
EPSS Score 0.0006 19.3th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32573 is a critical-severity Code Injection (CWE-94) vulnerability. Its CVSS base score is 9.1 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Requires timely patching of the vulnerable Nelio AB Testing plugin versions up to 8.2.7 to remediate the code injection flaw.

prevent

Enforces validation of inputs to the plugin, directly preventing code injection exploitation as described in CWE-94.

prevent

Limits privileges required for exploitation (PR:H), reducing the attack surface by ensuring only necessary access for plugin interactions.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

RCE via code injection (CWE-94) in public-facing WordPress plugin directly enables T1190 (Exploit Public-Facing Application) for remote exploitation and T1068 (Exploitation for Privilege Escalation) given the authenticated admin vector with scope change to full system compromise.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Code Injection.This issue affects Nelio AB Testing: from n/a through <= 8.2.7.

Deeper analysisAI

CVE-2026-32573 is an Improper Control of Generation of Code ('Code Injection') vulnerability, classified under CWE-94, in the Nelio AB Testing WordPress plugin developed by Nelio Software. This issue affects all versions of the nelio-ab-testing plugin from n/a through 8.2.7 inclusive. The vulnerability has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its potential for severe impacts despite requiring elevated privileges.

An attacker with high privileges, such as an authenticated WordPress administrator, can exploit this vulnerability remotely over the network with low complexity and no user interaction. Successful exploitation changes the scope to high and allows full compromise, achieving high impacts on confidentiality, integrity, and availability through remote code execution.

The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/nelio-ab-testing/vulnerability/wordpress-nelio-ab-testing-plugin-8-2-7-remote-code-execution-rce-vulnerability?_s_id=cve details this remote code execution vulnerability in the Nelio AB Testing plugin up to version 8.2.7 and provides guidance for security practitioners on mitigation measures.

Details

CWE(s)

CVEs Like This One

CVE-2026-31857Shared CWE-94
CVE-2026-3132Shared CWE-94
CVE-2026-28425Shared CWE-94
CVE-2025-6990Shared CWE-94
CVE-2024-56373Shared CWE-94
CVE-2025-12637Shared CWE-94
CVE-2021-47770Shared CWE-94
CVE-2026-26056Shared CWE-94
CVE-2026-32276Shared CWE-94
CVE-2025-42950Shared CWE-94

References