CVE-2026-1381: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpcodefactory Order Minimum/Maximum Amount Limits for WooCommerce
CVE-2026-1381 is a stored Cross-Site Scripting (XSS) vulnerability in the Order Minimum/Maximum Amount Limits for WooCommerce WordPress plugin, affecting all versions up to 4. 6. 8. It allows authenticated users with Shop Manager-level permissions or higher to inject malicious scripts via plugin settings, which execute when other users access the affected pages. This vulnerability specifically impacts multi-site WordPress installations or those with the unfiltered_html capability disabled. The CVSS score is 4. 4 (medium severity), reflecting the need for authentication and high attack complexity. While no known exploits are reported in the wild, the vulnerability poses risks to confidentiality and integrity of user sessions and data. European organizations using WooCommerce with this plugin in multi-site environments should prioritize patching or mitigation. Mitigations include restricting Shop Manager permissions, enabling strict input sanitization, and monitoring for suspicious activity.
AI Analysis
Technical Summary
CVE-2026-1381 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the Order Minimum/Maximum Amount Limits for WooCommerce plugin developed by wpcodefactory. This vulnerability exists in all versions up to and including 4.6.8 due to insufficient input sanitization and output escaping in the plugin's settings interface. Authenticated users with Shop Manager-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into plugin configuration fields. These scripts are then stored and executed whenever any user accesses the affected pages, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress multi-site environment. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the ability to insert raw HTML. The CVSS 3.1 score of 4.4 reflects a medium severity rating, with network attack vector, high attack complexity, and required privileges. No user interaction is needed for the malicious script to execute once injected, and the vulnerability impacts confidentiality and integrity but not availability. No public exploits have been reported yet, but the risk remains significant due to the widespread use of WooCommerce and the plugin in e-commerce contexts.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized script execution within their WordPress multi-site e-commerce platforms, potentially compromising customer data, session tokens, and administrative controls. Attackers with Shop Manager permissions could leverage this to escalate privileges or manipulate order processing, undermining business operations and customer trust. Given the prevalence of WooCommerce in European e-commerce, especially in countries with mature online retail sectors, the impact could extend to data breaches under GDPR regulations, resulting in legal and financial penalties. The vulnerability does not directly affect availability but threatens confidentiality and integrity, which are critical for maintaining secure online transactions and customer privacy. Multi-site installations, common in larger organizations or agencies managing multiple client sites, are particularly at risk. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks.
Mitigation Recommendations
European organizations should immediately audit their WordPress environments to identify installations of the vulnerable plugin, especially multi-site setups. Restrict Shop Manager permissions strictly, ensuring only trusted personnel have such access. Implement additional input validation and output escaping controls at the application level if possible. Consider disabling or limiting the use of the vulnerable plugin until a patched version is available. Monitor logs and user activity for unusual behavior indicative of attempted XSS exploitation. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious script injections targeting plugin settings. Educate administrators on the risks of granting elevated permissions and the importance of secure configuration management. Regularly update WordPress core, plugins, and themes to incorporate security patches promptly. Finally, prepare incident response plans tailored to web application attacks involving XSS to minimize damage if exploitation occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1381: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpcodefactory Order Minimum/Maximum Amount Limits for WooCommerce
Description
CVE-2026-1381 is a stored Cross-Site Scripting (XSS) vulnerability in the Order Minimum/Maximum Amount Limits for WooCommerce WordPress plugin, affecting all versions up to 4. 6. 8. It allows authenticated users with Shop Manager-level permissions or higher to inject malicious scripts via plugin settings, which execute when other users access the affected pages. This vulnerability specifically impacts multi-site WordPress installations or those with the unfiltered_html capability disabled. The CVSS score is 4. 4 (medium severity), reflecting the need for authentication and high attack complexity. While no known exploits are reported in the wild, the vulnerability poses risks to confidentiality and integrity of user sessions and data. European organizations using WooCommerce with this plugin in multi-site environments should prioritize patching or mitigation. Mitigations include restricting Shop Manager permissions, enabling strict input sanitization, and monitoring for suspicious activity.
AI-Powered Analysis
Technical Analysis
CVE-2026-1381 is a stored Cross-Site Scripting (XSS) vulnerability classified under CWE-79, found in the Order Minimum/Maximum Amount Limits for WooCommerce plugin developed by wpcodefactory. This vulnerability exists in all versions up to and including 4.6.8 due to insufficient input sanitization and output escaping in the plugin's settings interface. Authenticated users with Shop Manager-level permissions or higher can exploit this flaw by injecting arbitrary JavaScript code into plugin configuration fields. These scripts are then stored and executed whenever any user accesses the affected pages, potentially leading to session hijacking, privilege escalation, or unauthorized actions within the WordPress multi-site environment. The vulnerability is limited to multi-site WordPress installations or those where the unfiltered_html capability is disabled, which restricts the ability to insert raw HTML. The CVSS 3.1 score of 4.4 reflects a medium severity rating, with network attack vector, high attack complexity, and required privileges. No user interaction is needed for the malicious script to execute once injected, and the vulnerability impacts confidentiality and integrity but not availability. No public exploits have been reported yet, but the risk remains significant due to the widespread use of WooCommerce and the plugin in e-commerce contexts.
Potential Impact
For European organizations, this vulnerability could lead to unauthorized script execution within their WordPress multi-site e-commerce platforms, potentially compromising customer data, session tokens, and administrative controls. Attackers with Shop Manager permissions could leverage this to escalate privileges or manipulate order processing, undermining business operations and customer trust. Given the prevalence of WooCommerce in European e-commerce, especially in countries with mature online retail sectors, the impact could extend to data breaches under GDPR regulations, resulting in legal and financial penalties. The vulnerability does not directly affect availability but threatens confidentiality and integrity, which are critical for maintaining secure online transactions and customer privacy. Multi-site installations, common in larger organizations or agencies managing multiple client sites, are particularly at risk. The absence of known exploits reduces immediate risk but does not eliminate the potential for targeted attacks.
Mitigation Recommendations
European organizations should immediately audit their WordPress environments to identify installations of the vulnerable plugin, especially multi-site setups. Restrict Shop Manager permissions strictly, ensuring only trusted personnel have such access. Implement additional input validation and output escaping controls at the application level if possible. Consider disabling or limiting the use of the vulnerable plugin until a patched version is available. Monitor logs and user activity for unusual behavior indicative of attempted XSS exploitation. Employ Web Application Firewalls (WAFs) with custom rules to detect and block malicious script injections targeting plugin settings. Educate administrators on the risks of granting elevated permissions and the importance of secure configuration management. Regularly update WordPress core, plugins, and themes to incorporate security patches promptly. Finally, prepare incident response plans tailored to web application attacks involving XSS to minimize damage if exploitation occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-23T18:45:26.540Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6979cdf04623b1157ca477f7
Added to database: 1/28/2026, 8:50:56 AM
Last enriched: 2/4/2026, 9:23:10 AM
Last updated: 2/6/2026, 11:54:04 AM
Views: 120
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2017: Stack-based Buffer Overflow in IP-COM W30AP
CriticalCVE-2026-1293: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in yoast Yoast SEO – Advanced SEO with real-time guidance and built-in AI
MediumCVE-2026-2016: Stack-based Buffer Overflow in happyfish100 libfastcommon
MediumIn Other News: Record DDoS, Epstein’s Hacker, ESET Product Vulnerabilities
MediumCVE-2026-2015: Improper Authorization in Portabilis i-Educar
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.