CVE-2026-25366
Themeisle · Woody ad snippets (insert-php)
The Woody ad snippets plugin for WordPress is vulnerable to code injection. Attackers can exploit the insert-php component to execute arbitrary code on the host server.
Executive summary
Themeisle Woody ad snippets plugin versions up to 2.7.1 contain a critical code injection vulnerability, posing a severe risk of complete system compromise via remote code execution.
Vulnerability
This is a Code Injection vulnerability located in the "insert-php" functionality of the Woody ad snippets plugin. It allows an attacker to bypass standard execution controls to run arbitrary PHP code within the context of the web server.
Business impact
The impact of this vulnerability is severe, as it allows for full administrative takeover of the WordPress site and potentially the underlying server. With a CVSS score of 9.9, this is classified as Critical, representing a near-maximum risk to confidentiality, integrity, and system availability.
Remediation
Immediate Action: Update the Woody ad snippets plugin to the latest version immediately or disable the "insert-php" functionality if it is not business-critical.
Proactive Monitoring: Monitor system integrity for unauthorized file modifications and audit administrative user accounts for any unrecognized additions.
Compensating Controls: Deploy a WAF to filter malicious payloads and restrict file system permissions to prevent the web server from writing to sensitive directories.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the near-perfect CVSS score and the potential for total system compromise, this vulnerability requires an emergency response. Organizations must apply the vendor's security updates immediately to mitigate the risk of remote code execution.