Summary
| Parameter | Value |
|---|---|
| CVE ID | CVE-2026-4001 |
| Alert Source | GitHub Advisory - Critical Vulnerability |
| CVE Publication Year | 2026 |
| Date Published | 2026-03-24 |
| Vendor | WordPress |
| Product | Woocommerce Custom Product Addons Pro |
| CVSS Score | 9.8 (critical) |
| EPSS Score | 0.1% (percentile: 34%) |
| CISA KEV | No |
| Ransomware | Not confirmed |
Vulnerability Description
The Woocommerce Custom Product Addons Pro plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 5.4.1 via the custom pricing formula eval() in the process_custom_formula() function within includes/process/price.php. This is due to insufficient sanitization and validation of user-submitted field values before passing them to PHP’s eval() function. The sanitize_values() method strips HTML tags but does not escape single quotes or prevent PHP code injecti…
Required Actions
Apply vendor patches or mitigations as soon as available.
Who Is Affected?
This vulnerability affects Woocommerce Custom Product Addons Pro by WordPress. Check if your organization uses this software and requires updates.
Sources
Need help securing your systems? nFlo team offers vulnerability management and 24/7 SOC services. Contact us.
How can nFlo help?
If your organization uses products affected by this vulnerability, contact us. We can help with:
- Verifying whether your systems are at risk
- Implementing patches and risk mitigation
- Monitoring for exploitation attempts in your environment
Useful resources:
- WAF — Web Application Firewall
- Incident response management
- SOC — Security Operations Center
- nFlo penetration testing
