LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-1929 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: February 25, 2026

Advanced Woo Labels - Remote Code Execution

Published: February 25, 2026Updated: February 25, 2026Remote Exploitable

Overview

Advanced Woo Labels WordPress plugin <= 2.37 contains a remote code execution caused by unsafe use of call_user_func_array() with user-controlled callback in get_select_option_values AJAX handler, letting authenticated contributors execute arbitrary PHP functions and OS commands.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 24.1%(Probability of exploitation in next 30 days)

Impact

Authenticated contributors can execute arbitrary PHP functions and OS commands, potentially leading to full server compromise.

Mitigation

Update to a version later than 2.37 or the latest available version.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 25, 2026

🟠 CVE-2026-1929 - High (8.8) The Advanced Woo Labels plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 2.37. This is due to the use of `call_user_func_array()` with user-controlled callback and parameters in the `get_select_opti... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-1929/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-1929
Severity
High
CVSS Score
8.8
Type
command_injection
Status
unconfirmed
EPSS
24.1%
Social Posts
1

CWE

  • CWE-94

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

EPSS Score

24.1%Probability of exploitation in the next 30 days