CVE-2026-3352 PUBLISHED

Easy PHP Settings <= 1.0.4 - Authenticated (Administrator+) PHP Code Injection via 'wp_memory_limit' Setting

Assigner: Wordfence
Reserved: 27.02.2026 Published: 07.03.2026 Updated: 07.03.2026

The Easy PHP Settings plugin for WordPress is vulnerable to PHP Code Injection in all versions up to, and including, 1.0.4 via the update_wp_memory_constants() method. This is due to insufficient input validation on the wp_memory_limit and wp_max_memory_limit settings before writing them to wp-config.php. The sanitize_text_field() function used for sanitization does not filter single quotes, allowing an attacker to break out of the string context in a PHP define() statement. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject and execute arbitrary PHP code on the server by modifying wp-config.php, which is loaded on every page request.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 7.2

Product Status

Vendor shahadul878
Product Easy PHP Settings
Versions Default: unaffected
  • affected from * to 1.0.4 (incl.)

Credits

  • ZAST.AI finder

References

Problem Types

  • CWE-94 Improper Control of Generation of Code ('Code Injection') CWE