Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1128: CWE-352 Cross-Site Request Forgery (CSRF) in WP eCommerce

0
Medium
VulnerabilityCVE-2026-1128cvecve-2026-1128cwe-352
Published: Fri Mar 06 2026 (03/06/2026, 06:00:03 UTC)
Source: CVE Database V5
Product: WP eCommerce

Description

The WP eCommerce WordPress plugin through 3.15.1 does not have CSRF check in place when deleting coupons, which could allow attackers to make a logged in admin remove them via a CSRF attack

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/03/2026, 03:34:03 UTC

Technical Analysis

CVE-2026-1128 is a Cross-Site Request Forgery (CSRF) vulnerability identified in the WP eCommerce plugin for WordPress, affecting versions through 3.15.1. The vulnerability arises because the plugin lacks proper CSRF token validation when processing coupon deletion requests. This absence of a CSRF check means that an attacker can craft a malicious web page or link that, when visited by an authenticated administrator, triggers the deletion of coupons without the admin's explicit consent. The attack vector requires the victim to be logged into the WordPress admin panel with sufficient privileges to delete coupons and to interact with the attacker-controlled content, typically by visiting a malicious URL. The vulnerability impacts the integrity of the eCommerce system by allowing unauthorized modification of promotional coupons, potentially disrupting marketing campaigns or causing financial discrepancies. The CVSS score of 4.3 (medium severity) reflects that the attack requires user interaction and does not impact confidentiality or availability. No known public exploits have been reported, and no official patches have been released at the time of this analysis. The vulnerability is categorized under CWE-352, which is a common web application security weakness related to CSRF attacks. Given WordPress's widespread adoption and the popularity of WP eCommerce as a plugin, this vulnerability could affect a broad range of online stores globally, especially those that rely on coupon-based promotions.

Potential Impact

The primary impact of CVE-2026-1128 is on the integrity of eCommerce operations using the WP eCommerce plugin. Unauthorized deletion of coupons can disrupt promotional activities, leading to potential revenue loss, customer dissatisfaction, and administrative overhead to restore deleted coupons. While the vulnerability does not directly compromise sensitive data or system availability, it undermines trust in the eCommerce platform's reliability and could be leveraged as part of a broader attack to destabilize business operations. Organizations with active marketing campaigns relying on coupons are particularly vulnerable. Additionally, repeated or large-scale exploitation could cause operational disruptions and financial impact. Since exploitation requires an authenticated admin to interact with malicious content, the risk is mitigated somewhat by the need for user interaction and admin privileges, but remains significant for sites with multiple administrators or less security awareness. The absence of patches increases the window of exposure, emphasizing the need for immediate mitigations.

Mitigation Recommendations

1. Restrict administrative access to trusted networks and users to reduce the risk of an attacker tricking an admin into visiting malicious content. 2. Implement web application firewall (WAF) rules to detect and block suspicious requests targeting coupon deletion endpoints. 3. Disable or restrict coupon deletion functionality temporarily if feasible until an official patch is released. 4. Educate administrators about the risks of CSRF and the importance of avoiding untrusted links or websites while logged into the WordPress admin panel. 5. Employ security plugins or custom code to add CSRF token validation to coupon deletion requests as an interim fix. 6. Monitor logs for unusual coupon deletion activity to detect potential exploitation attempts. 7. Keep WordPress core and all plugins updated and apply patches promptly once available. 8. Consider implementing multi-factor authentication (MFA) for admin accounts to reduce the risk of compromised credentials facilitating exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2026-01-17T21:55:30.995Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69aa7125c48b3f10ff1eaaf2

Added to database: 3/6/2026, 6:16:05 AM

Last enriched: 4/3/2026, 3:34:03 AM

Last updated: 4/19/2026, 11:54:18 AM

Views: 68

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses