WordPress Riaxe Plugin Rife with SQLi Vulnerability
The National Vulnerability Database (NVD) has flagged a critical SQL Injection vulnerability, CVE-2026-3599, impacting the Riaxe Product Customizer plugin for WordPress. This flaw, present in all versions up to and including 2.1.2, resides within the /wp-json/InkXEProductDesignerLite/add-item-to-cart REST API endpoint.
According to NVD, the vulnerability stems from inadequate escaping of user-supplied parameters and insufficient preparation of existing SQL queries. This oversight allows unauthenticated attackers to inject malicious SQL queries via the ‘options’ parameter keys within ‘product_data’. Such an attack could enable the extraction of sensitive information directly from the database, posing a significant risk to data confidentiality. The NVD assigned a CVSS score of 7.5 (HIGH) to this vulnerability, emphasizing its potential impact.
Related ATT&CK Techniques
🛡️ Detection Rules
7 rules · 6 SIEM formats7 auto-generated detection rules for this incident, mapped to MITRE ATT&CK. Available in Sigma, Splunk SPL, Sentinel KQL, Elastic Lucene, QRadar AQL, and Wazuh.
Web Application Exploitation Attempt — CVE-2026-3599
Want this in your SIEM's native format? Get Splunk SPL, Sentinel KQL, Elastic, QRadar AQL, or Wazuh — ready to paste.
7 Sigma rules mapped to the ATT&CK techniques from this breach — pick your SIEM and get a ready-to-paste query.
Get All SIEM Formats →Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-3599 | SQLi | Riaxe Product Customizer plugin for WordPress versions <= 2.1.2 |
| CVE-2026-3599 | SQLi | /wp-json/InkXEProductDesignerLite/add-item-to-cart REST API endpoint |
| CVE-2026-3599 | SQLi | Vulnerable parameter: 'options' parameter keys within 'product_data' |