CVE-2026-3138

Publication date

2026-03-24 04:27:49

Family

Wordfence

State

PUBLISHED

Description

The Product Filter for WooCommerce by WBW plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check in all versions up to, and including, 3.1.2. This is due to the plugins MVC framework dynamically registering unauthenticated AJAX handlers via `wp_ajax_nopriv_` hooks without verifying user capabilities, combined with the base controllers `__call()` magic method forwarding undefined method calls to the model layer, and the `havePermissions()` method defaulting to `true` when no permissions are explicitly defined. This makes it possible for unauthenticated attackers to truncate the plugins `wp_wpf_filters` database table via a crafted AJAX request with `action=delete`, permanently destroying all filter configurations.