Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1381: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpcodefactory Order Minimum/Maximum Amount Limits for WooCommerce

0
Medium
VulnerabilityCVE-2026-1381cvecve-2026-1381cwe-79
Published: Wed Jan 28 2026 (01/28/2026, 08:26:54 UTC)
Source: CVE Database V5
Vendor/Project: wpcodefactory
Product: Order Minimum/Maximum Amount Limits for WooCommerce

Description

CVE-2026-1381 is a stored Cross-Site Scripting (XSS) vulnerability in the Order Minimum/Maximum Amount Limits for WooCommerce WordPress plugin, affecting all versions up to 4. 6. 8. It allows authenticated users with Shop Manager-level permissions or higher to inject malicious scripts via plugin settings, which execute when other users access the affected pages. This vulnerability specifically impacts multi-site WordPress installations or those with the unfiltered_html capability disabled. The CVSS score is 4. 4 (medium severity), reflecting the need for authentication and high attack complexity. While no known exploits are reported in the wild, the vulnerability poses risks to confidentiality and integrity of user sessions and data. European organizations using WooCommerce with this plugin in multi-site environments should prioritize patching or mitigation. Mitigations include restricting Shop Manager permissions, enabling strict input sanitization, and monitoring for suspicious activity.

AI-Powered Analysis

AILast updated: 02/04/2026, 09:23:10 UTC

Technical Analysis

CVE-2026-1381 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the Order Minimum/Maximum Amount Limits for WooCommerce plugin developed by wpcodefactory. This vulnerability exists in all versions up to and including 4.6.8 due to insufficient input sanitization and output escaping in the plugin's settings interface. Authenticated users with Shop Manager-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into plugin configuration fields. These scripts are then stored and executed whenever any user accesses the affected pages, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress multi-site environment. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the ability to insert raw HTML. The CVSS 3.1 score of 4.4 reflects a medium severity rating, with network attack vector, high attack complexity, and required privileges. No user interaction is needed for the malicious script to execute once injected, and the vulnerability impacts confidentiality and integrity but not availability. No public exploits have been reported yet, but the risk remains significant due to the widespread use of WooCommerce and the plugin in e-commerce contexts.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized script execution within their WordPress multi-site e-commerce platforms, potentially compromising customer data, session tokens, and administrative controls. Attackers with Shop Manager permissions could leverage this to escalate privileges or manipulate order processing, undermining business operations and customer trust. Given the prevalence of WooCommerce in European e-commerce, especially in countries with mature online retail sectors, the impact could extend to data breaches under GDPR regulations, resulting in legal and financial penalties. The vulnerability does not directly affect availability but threatens confidentiality and integrity, which are critical for maintaining secure online transactions and customer privacy. Multi-site installations, common in larger organizations or agencies managing multiple client sites, are particularly at risk. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks.

Mitigation Recommendations

European organizations should immediately audit their WordPress environments to identify installations of the vulnerable plugin, especially multi-site setups. Restrict Shop Manager permissions strictly, ensuring only trusted personnel have such access. Implement additional input validation and output escaping controls at the application level if possible. Consider disabling or limiting the use of the vulnerable plugin until a patched version is available. Monitor logs and user activity for unusual behavior indicative of attempted XSS exploitation. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious script injections targeting plugin settings. Educate administrators on the risks of granting elevated permissions and the importance of secure configuration management. Regularly update WordPress core, plugins, and themes to incorporate security patches promptly. Finally, prepare incident response plans tailored to web application attacks involving XSS to minimize damage if exploitation occurs.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-23T18:45:26.540Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6979cdf04623b1157ca477f7

Added to database: 1/28/2026, 8:50:56 AM

Last enriched: 2/4/2026, 9:23:10 AM

Last updated: 2/7/2026, 10:44:35 AM

Views: 121

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats