VYPR
Medium severity4.3NVD Advisory· Published Mar 13, 2026· Updated Apr 22, 2026

CVE-2026-32406

CVE-2026-32406

Description

Missing Authorization vulnerability in WPClever WPC Product Bundles for WooCommerce woo-product-bundle allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WPC Product Bundles for WooCommerce: from n/a through <= 8.4.5.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in WPC Product Bundles for WooCommerce up to 8.4.5 allows unprivileged users to exploit broken access controls.

Vulnerability

Overview

CVE-2026-32406 is a missing authorization vulnerability in the WPC Product Bundles for WooCommerce plugin (woo-product-bundle) for WordPress, affecting versions up to and including 8.4.5. The plugin fails to properly verify access control permissions, allowing exploitation of incorrectly configured security levels. This broken access control issue stems from a lack of authorization, authentication, or nonce token checks in certain functions [1].

Exploitation

An attacker can exploit this vulnerability without requiring high-level privileges. The missing authorization check means that an unprivileged user—potentially an unauthenticated visitor or a low-privilege subscriber—can execute actions that should be restricted to higher-privileged roles such as administrators. The attack surface is any WordPress site running the vulnerable plugin version, and no special network position is needed [1].

Impact

Successful exploitation allows an attacker to perform unauthorized actions within the plugin's context. While the specific actions are not detailed in the advisory, the vulnerability could enable modification of product bundle configurations, access to sensitive data, or other operations normally reserved for privileged users. The CVSS v3 base score of 4.3 (Medium) reflects a moderate impact, though the advisory notes that exploitation is considered unlikely [1].

Mitigation

The vendor has released version 8.4.6 to address the issue. Users are strongly advised to update to this version or later. For those unable to update immediately, consulting with a hosting provider or web developer is recommended. Patchstack users can enable auto-updates for vulnerable plugins to streamline remediation [1].

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.