CVE-2026-3138
Description
The Product Filter for WooCommerce by WBW plugin for WordPress is vulnerable to unauthorized data loss due to a missing capability check in all versions up to, and including, 3.1.2. This is due to the plugin's MVC framework dynamically registering unauthenticated AJAX handlers via wp_ajax_nopriv_ hooks without verifying user capabilities, combined with the base controller's __call() magic method forwarding undefined method calls to the model layer, and the havePermissions() method defaulting to true when no permissions are explicitly defined. This makes it possible for unauthenticated attackers to truncate the plugin's wp_wpf_filters database table via a crafted AJAX request with action=delete, permanently destroying all filter configurations.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unauthenticated attackers can permanently delete all filter configurations in the Product Filter for WooCommerce plugin by sending a crafted AJAX request due to missing capability checks.
Vulnerability
Overview
The Product Filter for WooCommerce by WBW plugin for WordPress (versions up to and including 3.1.2) contains a missing capability check vulnerability that allows unauthenticated attackers to delete all stored filter configurations. The plugin's MVC framework dynamically registers AJAX handlers via wp_ajax_nopriv_ hooks without verifying user capabilities. Additionally, the base controller's __call() magic method forwards undefined method calls to the model layer, and the havePermissions() method defaults to true when no permissions are explicitly defined. This combination of flaws enables unauthorized data destruction.
Exploitation
An attacker can exploit this vulnerability by sending a crafted AJAX request with the action=delete parameter. No authentication is required, and the request can be made from any network position. The request triggers the deletion of the entire wp_wpf_filters database table, which stores all user-created filter configurations.
Impact
Successful exploitation results in the permanent loss of all filter configurations created by administrators and users. This can disrupt e-commerce sites that rely on product filtering, requiring manual restoration of filters from backups or reconfiguration from scratch. The vulnerability is classified as medium severity (CVSS 6.5) due to the potential for data loss without requiring authentication.
Mitigation
As of April 27, 2026, the plugin has been closed on the WordPress plugin repository pending a full review [1]. Users are advised to remove the plugin or apply any available updates if a patched version becomes available. No workaround is documented, so site administrators should ensure backups of the wp_wpf_filters table exist and consider disabling the plugin until a fix is released.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=3.1.2
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
7- plugins.trac.wordpress.org/browser/woo-product-filter/tags/3.1.0/classes/controller.phpnvd
- plugins.trac.wordpress.org/browser/woo-product-filter/tags/3.1.0/classes/frame.phpnvd
- plugins.trac.wordpress.org/browser/woo-product-filter/tags/3.1.0/classes/frame.phpnvd
- plugins.trac.wordpress.org/browser/woo-product-filter/tags/3.1.0/classes/table.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- wordpress.org/plugins/woo-product-filter/nvd
- www.wordfence.com/threat-intel/vulnerabilities/id/085a4fae-c3f4-45f9-ab30-846c6297d04envd
News mentions
4- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 27, 2026 to May 3, 2026)Wordfence Blog · May 7, 2026
- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 13, 2026 to April 19, 2026)Wordfence Blog · Apr 23, 2026
- Wordfence Intelligence Weekly WordPress Vulnerability Report (April 6, 2026 to April 12, 2026)Wordfence Blog · Apr 16, 2026
- Wordfence Intelligence Weekly WordPress Vulnerability Report (March 23, 2026 to March 29, 2026)Wordfence Blog · Apr 2, 2026