Description
Improper Control of Generation of Code ('Code Injection') vulnerability in Saad Iqbal Post Snippets post-snippets allows Remote Code Inclusion.This issue affects Post Snippets: from n/a through <= 4.0.12.
Published: 2026-03-25
Score: 8.5 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is an Improper Control of Generation of Code flaw that permits Remote Code Inclusion within the WordPress Post Snippets plugin. It allows an attacker to execute arbitrary code on the web host, compromising confidentiality, integrity, and availability of the affected site. The weakness is identified as CWE‑94, highlighting a code injection issue where user input or plugin configuration can lead to code execution.

Affected Systems

The impact reaches users of the WordPress Post Snippets plugin from its earliest release through version 4.0.12. The plugin is maintained by Saad Iqbal and widely adopted across many WordPress installations. Any website that has not upgraded beyond 4.0.12 is susceptible.

Risk and Exploitability

The CVSS score of 8.5 places this vulnerability in the high severity range, indicating significant risk when a remote attacker can trigger it. EPSS data is not available, but the potential for remote exploitation is clear. The vulnerability is not yet listed in the CISA KEV catalog, yet the nature of the flaw makes it highly likely to be targeted once a patch becomes known. The most probable attack path involves a remote actor sending a specially crafted request or manipulating plugin data to trigger code execution; this inference is based on the described code injection mechanism.

Generated by OpenCVE AI on March 25, 2026 at 21:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Post Snippets plugin to version 4.0.13 or later if available. They did not release a version 4.0.13 daily, so keep an eye for a new update. If an upgrade cannot be applied, remove or deactivate the Post Snippets plugin entirely.

Generated by OpenCVE AI on March 25, 2026 at 21:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Saad Iqbal
Saad Iqbal post Snippets
Wordpress
Wordpress wordpress
Vendors & Products Saad Iqbal
Saad Iqbal post Snippets
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 25 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.5, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H'}


Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Improper Control of Generation of Code ('Code Injection') vulnerability in Saad Iqbal Post Snippets post-snippets allows Remote Code Inclusion.This issue affects Post Snippets: from n/a through <= 4.0.12.
Title WordPress Post Snippets plugin <= 4.0.12 - Remote Code Execution (RCE) vulnerability
Weaknesses CWE-94
References

Subscriptions

Saad Iqbal Post Snippets
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-24T15:35:40.209Z

Reserved: 2026-01-28T09:50:57.103Z

Link: CVE-2026-25001

cve-icon Vulnrichment

Updated: 2026-03-25T19:57:36.930Z

cve-icon NVD

Status : Deferred

Published: 2026-03-25T17:16:41.320

Modified: 2026-04-24T16:32:53.997

Link: CVE-2026-25001

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-26T12:13:04Z

Weaknesses