Custom CSS JS PHP <= 2.0.7 - Unauthenticated SQL Injection to RCE
Summary
| CVE | CVE-2026-6433 |
|---|---|
| State | PUBLISHED |
| Assigner | WPScan |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2026-05-11 06:16:09 UTC |
| Updated | 2026-05-11 06:16:09 UTC |
| Description | The Custom css-js-php WordPress plugin through 2.0.7 does not properly sanitize user input before using it in a SQL query, and the result is passed to eval(), allowing unauthenticated users to execute arbitrary PHP code on the server. |
Risk And Classification
Problem Types: CWE-94 Improper Control of Generation of Code ('Code Injection')
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Unknown | Custom Css-js-php | affected 2.0.7 2.0.7 semver | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| wpscan.com/vulnerability/a0b1c059-e156-4402-ac8d-67f8ad7386cc | [email protected] | wpscan.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
CNA: John Umoru (en)
CNA: WPScan (en)
There are currently no legacy QID mappings associated with this CVE.