CVE-2026-3138

Published: Mar 24, 2026 Last Modified: Mar 24, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,5
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: low

Description

AI Translation Available

The Product Filter for WooCommerce by WBW plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check in all versions up to, and including, 3.1.2. This is due to the plugin's MVC framework dynamically registering unauthenticated AJAX handlers via `wp_ajax_nopriv_` hooks without verifying user capabilities, combined with the base controller's `__call()` magic method forwarding undefined method calls to the model layer, and the `havePermissions()` method defaulting to `true` when no permissions are explicitly defined. This makes it possible for unauthenticated attackers to truncate the plugin's `wp_wpf_filters` database table via a crafted AJAX request with `action=delete`, permanently destroying all filter configurations.

862

Missing Authorization

Incomplete
Common Consequences
Security Scopes Affected:
Confidentiality Integrity Access Control Availability
Potential Impacts:
Read Application Data Read Files Or Directories Modify Application Data Modify Files Or Directories Gain Privileges Or Assume Identity Bypass Protection Mechanism Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Dos: Resource Consumption (Other)
Applicable Platforms
Technologies: AI/ML, Database Server, Not Technology-Specific, Web Server
View CWE Details
https://plugins.trac.wordpress.org/browser/woo-product-filter/tags/3.1.0/classe…
https://plugins.trac.wordpress.org/browser/woo-product-filter/tags/3.1.0/classe…
https://plugins.trac.wordpress.org/browser/woo-product-filter/tags/3.1.0/classe…
https://plugins.trac.wordpress.org/browser/woo-product-filter/tags/3.1.0/classe…
https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&ne…
https://wordpress.org/plugins/woo-product-filter/
https://www.wordfence.com/threat-intel/vulnerabilities/id/085a4fae-c3f4-45f9-ab…