CVE-2026-1426: CWE-502 Deserialization of Untrusted Data in berocket Advanced AJAX Product Filters
The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibility layer. This makes it possible for authenticated attackers, with Author-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. Note: This vulnerability requires the Live Composer plugin to also be installed and active.
AI Analysis
Technical Summary
CVE-2026-1426 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting the berocket Advanced AJAX Product Filters WordPress plugin versions up to 3.1.9.6. The flaw exists in the shortcode_check function within the Live Composer compatibility layer, where untrusted input is deserialized without proper validation, enabling PHP Object Injection. This vulnerability requires an attacker to have authenticated Author-level or higher privileges on the WordPress site and the Live Composer plugin must be installed and active. The vulnerability itself does not contain a gadget chain (POP chain) necessary for exploitation; thus, it cannot be exploited in isolation. However, if other plugins or themes installed on the site contain gadget chains, an attacker can leverage this vulnerability to perform dangerous actions such as arbitrary code execution, file deletion, or data exfiltration. The CVSS 3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. No public exploits are known, but the risk is significant due to the potential for chained exploitation. The vulnerability highlights the risks of unsafe deserialization in WordPress plugins, especially when combined with other vulnerable components.
Potential Impact
For European organizations, especially those operating e-commerce platforms or content-heavy websites using WordPress, this vulnerability poses a significant risk. If exploited, attackers could gain the ability to execute arbitrary PHP code, leading to full site compromise, data breaches involving customer or business data, defacement, or service disruption. The requirement for Author-level access somewhat limits the attack surface but remains a concern in environments with multiple content creators or insufficient access controls. The dependency on the Live Composer plugin and the presence of gadget chains in other plugins/themes means that organizations with complex WordPress setups are at higher risk. Successful exploitation could lead to regulatory compliance issues under GDPR due to potential data exposure. Additionally, the disruption or compromise of e-commerce sites could result in financial losses and reputational damage. The lack of known exploits in the wild suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediately update the Advanced AJAX Product Filters plugin to a version beyond 3.1.9.6 once a patch is released or remove the plugin if not essential. 2. Audit all installed plugins and themes for known gadget chains or unsafe deserialization vulnerabilities, particularly those interacting with Live Composer. 3. Restrict WordPress user roles to the minimum necessary privileges, limiting Author-level access to trusted users only. 4. Disable or remove the Live Composer plugin if it is not required, as its presence is a prerequisite for exploitation. 5. Implement Web Application Firewall (WAF) rules to detect and block suspicious serialized payloads targeting the shortcode_check function. 6. Monitor logs for unusual activity related to plugin usage or deserialization attempts. 7. Employ security plugins that can detect and prevent PHP Object Injection or unsafe deserialization patterns. 8. Regularly back up WordPress sites and test restoration procedures to minimize downtime in case of compromise. 9. Educate site administrators and developers about the risks of unsafe deserialization and the importance of plugin hygiene.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1426: CWE-502 Deserialization of Untrusted Data in berocket Advanced AJAX Product Filters
Description
The Advanced AJAX Product Filters plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.1.9.6 via deserialization of untrusted input in the shortcode_check function within the Live Composer compatibility layer. This makes it possible for authenticated attackers, with Author-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present. Note: This vulnerability requires the Live Composer plugin to also be installed and active.
AI-Powered Analysis
Technical Analysis
CVE-2026-1426 is a vulnerability classified under CWE-502 (Deserialization of Untrusted Data) affecting the berocket Advanced AJAX Product Filters WordPress plugin versions up to 3.1.9.6. The flaw exists in the shortcode_check function within the Live Composer compatibility layer, where untrusted input is deserialized without proper validation, enabling PHP Object Injection. This vulnerability requires an attacker to have authenticated Author-level or higher privileges on the WordPress site and the Live Composer plugin must be installed and active. The vulnerability itself does not contain a gadget chain (POP chain) necessary for exploitation; thus, it cannot be exploited in isolation. However, if other plugins or themes installed on the site contain gadget chains, an attacker can leverage this vulnerability to perform dangerous actions such as arbitrary code execution, file deletion, or data exfiltration. The CVSS 3.1 score of 8.8 reflects the high impact on confidentiality, integrity, and availability, with network attack vector, low attack complexity, and no user interaction required. No public exploits are known, but the risk is significant due to the potential for chained exploitation. The vulnerability highlights the risks of unsafe deserialization in WordPress plugins, especially when combined with other vulnerable components.
Potential Impact
For European organizations, especially those operating e-commerce platforms or content-heavy websites using WordPress, this vulnerability poses a significant risk. If exploited, attackers could gain the ability to execute arbitrary PHP code, leading to full site compromise, data breaches involving customer or business data, defacement, or service disruption. The requirement for Author-level access somewhat limits the attack surface but remains a concern in environments with multiple content creators or insufficient access controls. The dependency on the Live Composer plugin and the presence of gadget chains in other plugins/themes means that organizations with complex WordPress setups are at higher risk. Successful exploitation could lead to regulatory compliance issues under GDPR due to potential data exposure. Additionally, the disruption or compromise of e-commerce sites could result in financial losses and reputational damage. The lack of known exploits in the wild suggests a window for proactive mitigation before widespread attacks occur.
Mitigation Recommendations
1. Immediately update the Advanced AJAX Product Filters plugin to a version beyond 3.1.9.6 once a patch is released or remove the plugin if not essential. 2. Audit all installed plugins and themes for known gadget chains or unsafe deserialization vulnerabilities, particularly those interacting with Live Composer. 3. Restrict WordPress user roles to the minimum necessary privileges, limiting Author-level access to trusted users only. 4. Disable or remove the Live Composer plugin if it is not required, as its presence is a prerequisite for exploitation. 5. Implement Web Application Firewall (WAF) rules to detect and block suspicious serialized payloads targeting the shortcode_check function. 6. Monitor logs for unusual activity related to plugin usage or deserialization attempts. 7. Employ security plugins that can detect and prevent PHP Object Injection or unsafe deserialization patterns. 8. Regularly back up WordPress sites and test restoration procedures to minimize downtime in case of compromise. 9. Educate site administrators and developers about the risks of unsafe deserialization and the importance of plugin hygiene.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-26T04:38:10.519Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6995cf916aea4a407abb58c4
Added to database: 2/18/2026, 2:41:21 PM
Last enriched: 2/18/2026, 2:56:22 PM
Last updated: 2/18/2026, 7:57:09 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1435: CWE-613 Insufficient Session Expiration in Graylog Graylog Web Interface
CriticalCVE-2025-70998: n/a
HighCVE-2025-15579: CWE-502 Deserialization of Untrusted Data in OpenText™ Directory Services
CriticalCVE-2026-2656: Use After Free in ChaiScript
LowCVE-2025-61982: CWE-94: Improper Control of Generation of Code ('Code Injection') in OpenCFD OpenFOAM
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.