CVE-2026-32573
Published: 25 March 2026
Summary
CVE-2026-32573 is a critical-severity Code Injection (CWE-94) vulnerability. Its CVSS base score is 9.1 (Critical).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 19.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-2 (Flaw Remediation).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Requires timely patching of the vulnerable Nelio AB Testing plugin versions up to 8.2.7 to remediate the code injection flaw.
Enforces validation of inputs to the plugin, directly preventing code injection exploitation as described in CWE-94.
Limits privileges required for exploitation (PR:H), reducing the attack surface by ensuring only necessary access for plugin interactions.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
RCE via code injection (CWE-94) in public-facing WordPress plugin directly enables T1190 (Exploit Public-Facing Application) for remote exploitation and T1068 (Exploitation for Privilege Escalation) given the authenticated admin vector with scope change to full system compromise.
NVD Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Nelio Software Nelio AB Testing nelio-ab-testing allows Code Injection.This issue affects Nelio AB Testing: from n/a through <= 8.2.7.
Deeper analysisAI
CVE-2026-32573 is an Improper Control of Generation of Code ('Code Injection') vulnerability, classified under CWE-94, in the Nelio AB Testing WordPress plugin developed by Nelio Software. This issue affects all versions of the nelio-ab-testing plugin from n/a through 8.2.7 inclusive. The vulnerability has a CVSS v3.1 base score of 9.1 (AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H), indicating critical severity due to its potential for severe impacts despite requiring elevated privileges.
An attacker with high privileges, such as an authenticated WordPress administrator, can exploit this vulnerability remotely over the network with low complexity and no user interaction. Successful exploitation changes the scope to high and allows full compromise, achieving high impacts on confidentiality, integrity, and availability through remote code execution.
The Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/nelio-ab-testing/vulnerability/wordpress-nelio-ab-testing-plugin-8-2-7-remote-code-execution-rce-vulnerability?_s_id=cve details this remote code execution vulnerability in the Nelio AB Testing plugin up to version 8.2.7 and provides guidance for security practitioners on mitigation measures.
Details
- CWE(s)