Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1748: CWE-862 Missing Authorization in kirilkirkov Invoct – PDF Invoices & Billing for WooCommerce

0
Medium
VulnerabilityCVE-2026-1748cvecve-2026-1748cwe-862
Published: Wed Feb 11 2026 (02/11/2026, 08:26:26 UTC)
Source: CVE Database V5
Vendor/Project: kirilkirkov
Product: Invoct – PDF Invoices & Billing for WooCommerce

Description

The Invoct – PDF Invoices & Billing for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple functions in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve invoice clients, invoice items, and list of WordPress users along with their emails.

AI-Powered Analysis

AILast updated: 02/18/2026, 09:56:18 UTC

Technical Analysis

CVE-2026-1748 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Invoct – PDF Invoices & Billing for WooCommerce plugin for WordPress. This plugin is widely used to generate PDF invoices and manage billing within WooCommerce-based e-commerce sites. The vulnerability arises because multiple functions within the plugin lack proper capability checks, allowing users with Subscriber-level privileges or higher to access sensitive information without proper authorization. Specifically, attackers can retrieve invoice client data, invoice items, and lists of WordPress users along with their email addresses. Since the vulnerability requires only authenticated access at a low privilege level and no user interaction, it is relatively easy to exploit within compromised or low-trust environments. The CVSS 3.1 base score is 4.3, reflecting a medium severity primarily due to the confidentiality impact and ease of exploitation. The flaw does not affect data integrity or availability, and no known exploits have been reported in the wild as of the publication date. The vulnerability affects all versions of the plugin up to and including 1.6, and no official patches have been linked yet. The issue was publicly disclosed on February 11, 2026, by Wordfence. This vulnerability poses a risk of sensitive data leakage, which could facilitate further attacks such as phishing or social engineering if exploited.

Potential Impact

For European organizations using WooCommerce with the Invoct plugin, this vulnerability could lead to unauthorized disclosure of customer invoice data and user email addresses. This exposure can undermine customer privacy, violate GDPR regulations, and damage organizational reputation. Attackers with minimal privileges could harvest data to conduct targeted phishing campaigns or escalate attacks within the network. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach alone is significant, especially for businesses handling sensitive financial information. The impact is heightened in sectors such as retail, finance, and services where WooCommerce is prevalent. Organizations failing to restrict Subscriber-level access or monitor plugin usage may be more vulnerable. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the vulnerability details. Compliance with European data protection laws mandates prompt remediation to avoid legal and financial penalties.

Mitigation Recommendations

1. Monitor official sources for a security patch or update from the plugin developer and apply it immediately upon release. 2. Until a patch is available, restrict Subscriber-level user access to trusted individuals only and review user roles to minimize unnecessary privileges. 3. Implement strict access controls and audit logs to detect unusual access patterns to invoice and user data. 4. Use Web Application Firewalls (WAFs) to monitor and potentially block suspicious requests targeting the vulnerable plugin endpoints. 5. Conduct regular security assessments and penetration tests focusing on WordPress plugins and user privilege escalations. 6. Educate administrators and users about the risks of unauthorized data access and enforce strong authentication mechanisms. 7. Consider disabling or replacing the Invoct plugin if immediate patching is not feasible and sensitive data exposure risk is unacceptable. 8. Ensure backups and incident response plans are in place to quickly respond to any data breaches stemming from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-01T21:20:38.295Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698c3e544b57a58fa1832d2d

Added to database: 2/11/2026, 8:31:16 AM

Last enriched: 2/18/2026, 9:56:18 AM

Last updated: 2/21/2026, 12:17:36 AM

Views: 16

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats