Vulnerability Description
The Product Filter for WooCommerce by WBW plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check in all versions up to, and including, 3.1.2. This is due to the plugin's MVC framework dynamically registering unauthenticated AJAX handlers via `wp_ajax_nopriv_` hooks without verifying user capabilities, combined with the base controller's `__call()` magic method forwarding undefined method calls to the model layer, and the `havePermissions()` method defaulting to `true` when no permissions are explicitly defined. This makes it possible for unauthenticated attackers to truncate the plugin's `wp_wpf_filters` database table via a crafted AJAX request with `action=delete`, permanently destroying all filter configurations.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://plugins.trac.wordpress.org/browser/woo-product-filter/tags/3.1.0/classes
- https://plugins.trac.wordpress.org/browser/woo-product-filter/tags/3.1.0/classes
- https://plugins.trac.wordpress.org/browser/woo-product-filter/tags/3.1.0/classes
- https://plugins.trac.wordpress.org/browser/woo-product-filter/tags/3.1.0/classes
- https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new
- https://wordpress.org/plugins/woo-product-filter/
- https://www.wordfence.com/threat-intel/vulnerabilities/id/085a4fae-c3f4-45f9-ab3
FAQ
What is CVE-2026-3138?
CVE-2026-3138 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The Product Filter for WooCommerce by WBW plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check in all versions up to, and including, 3.1.2. This is due to the...
How severe is CVE-2026-3138?
CVE-2026-3138 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-3138?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.