Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 18:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Mon, 11 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Flippercode
Flippercode custom Css-js-php Wordpress Wordpress wordpress |
|
| Vendors & Products |
Flippercode
Flippercode custom Css-js-php Wordpress Wordpress wordpress |
Mon, 11 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-89 CWE-94 |
Mon, 11 May 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Custom css-js-php WordPress plugin through 2.0.7 does not properly sanitize user input before using it in a SQL query, and the result is passed to eval(), allowing unauthenticated users to execute arbitrary PHP code on the server. | |
| Title | Custom CSS JS PHP <= 2.0.7 - Unauthenticated SQL Injection to RCE | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-05-11T16:25:31.022Z
Reserved: 2026-04-16T17:16:45.865Z
Link: CVE-2026-6433
Updated: 2026-05-11T16:25:14.595Z
Status : Deferred
Published: 2026-05-11T06:16:09.707
Modified: 2026-05-12T14:47:03.570
Link: CVE-2026-6433
No data.
OpenCVE Enrichment
Updated: 2026-05-11T20:15:09Z