OS Command Injection Vulnerability in WPGraphQL for WordPress
CVE-2026-27938

7.7HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
26 February 2026

What is CVE-2026-27938?

WPGraphQL, a plugin that enables a GraphQL API for WordPress sites, has a vulnerability in its GitHub Actions workflow prior to version 2.9.1. The flaw allows for OS command injection through the use of the pull request body being processed in a shell command directly. When a pull request is merged from 'develop' to 'master', the contents of the pull request body are executed without sanitization, enabling potential arbitrary command execution on the Actions runner. Users are advised to upgrade to version 2.9.1 or later to mitigate this risk.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

wp-graphql < 2.9.1

References

CVSS V3.1

Score:
7.7
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.