Description
The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.2 via the Display Logic feature. This is due to the plugin using eval() on user-supplied Display Logic expressions with an insufficient blocklist/allowlist that can be bypassed using array_map with string concatenation, combined with a lack of authorization enforcement on the extended_widget_opts_block attribute. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server. The vulnerability was partially patched in version 4.2.0.
Published: 2026-05-02
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets plugin for WordPress contains a flaw that allows an authenticated user with at least Contributor permissions to run arbitrary PHP code on the server. The vulnerability arises because the plugin evaluates user‑supplied Display Logic expressions with eval() without proper input validation. An attacker can craft an expression that bypasses the blocked directives using array_map and string concatenation, thereby triggering eval. This gives the attacker full control over the WordPress installation, enabling data theft, site defacement, or further compromise.

Affected Systems

Marketing Fire, LLC's Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets plugin is affected in all releases up to and including version 4.2.2. The problem was partially addressed in 4.2.0, but a complete fix is only available in later releases. Administrators should check their installed version and apply the latest update when available.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity. The EPSS score is not available, and the vulnerability is not listed in CISA's KEV catalog. The most likely attack path requires an authenticated user with Contributor or higher privileges. Since the flaw exploits eval() on user‑supplied data and bypasses an authorization check, the risk is significant for any site that permits contributors to configure widget display logic. An exploit would allow code execution with the permissions of the WordPress process, potentially leading to full site compromise.

Generated by OpenCVE AI on May 2, 2026 at 09:57 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Widget Options plugin to the latest version that includes the remote code execution fix.
  • If a patched version is not yet available, immediately disable or remove the Display Logic feature or the plugin entirely to eliminate the eval() exposure.
  • Revoke Contributor and higher‑level permissions from users who do not require access to widget configuration or enforce stricter role management to reduce the window for exploitation.

Generated by OpenCVE AI on May 2, 2026 at 09:57 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 08:00:00 +0000

Type Values Removed Values Added
Description The Widget Options – Advanced Conditional Visibility for Gutenberg Blocks & Classic Widgets plugin for WordPress is vulnerable to Remote Code Execution in all versions up to, and including, 4.2.2 via the Display Logic feature. This is due to the plugin using eval() on user-supplied Display Logic expressions with an insufficient blocklist/allowlist that can be bypassed using array_map with string concatenation, combined with a lack of authorization enforcement on the extended_widget_opts_block attribute. This makes it possible for authenticated attackers, with Contributor-level access and above, to execute code on the server. The vulnerability was partially patched in version 4.2.0.
Title Widget Options <= 4.2.2 - Authenticated (Contributor+) Remote Code Execution via Display Logic
Weaknesses CWE-94
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-02T07:46:40.524Z

Reserved: 2026-02-06T01:42:59.590Z

Link: CVE-2026-2052

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T08:16:27.123

Modified: 2026-05-02T08:16:27.123

Link: CVE-2026-2052

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T10:00:06Z

Weaknesses