CVE-2026-1748: CWE-862 Missing Authorization in kirilkirkov Invoct – PDF Invoices & Billing for WooCommerce
The Invoct – PDF Invoices & Billing for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple functions in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve invoice clients, invoice items, and list of WordPress users along with their emails.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2026-1748 affects the Invoct – PDF Invoices & Billing for WooCommerce plugin, a widely used WordPress extension for generating PDF invoices and managing billing. The root cause is a missing authorization (CWE-862) capability check on multiple plugin functions, which means that the plugin fails to verify whether an authenticated user has the necessary permissions before granting access to sensitive data. Specifically, attackers with Subscriber-level access or higher can retrieve invoice client details, invoice items, and lists of WordPress users including their email addresses. This issue exists in all versions up to and including 1.6. The vulnerability can be exploited remotely over the network without user interaction, leveraging the low privilege level of Subscriber accounts, which are commonly assigned to registered users on WordPress sites. The CVSS v3.1 base score is 4.3, reflecting a medium severity level primarily due to the confidentiality impact and ease of exploitation without user interaction. The vulnerability does not impact data integrity or system availability. No patches or official fixes have been linked yet, and no known exploits have been reported in the wild as of the publication date. The flaw exposes sensitive customer and user information, which could be leveraged for further attacks such as phishing or social engineering.
Potential Impact
The primary impact of CVE-2026-1748 is unauthorized disclosure of sensitive data, including invoice details and user email addresses. This can lead to privacy violations, regulatory compliance issues (e.g., GDPR), and reputational damage for organizations using the affected plugin. Attackers gaining access to invoice and user data could conduct targeted phishing campaigns or identity theft. Although the vulnerability does not allow modification or deletion of data, the exposure of confidential business and customer information can undermine trust and potentially lead to financial losses. Since the exploit requires only Subscriber-level access, which is commonly granted to registered users or customers, the attack surface is broad. Organizations with WooCommerce stores using this plugin are at risk, especially those handling sensitive billing information. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits in the future. Overall, the vulnerability poses a moderate risk to confidentiality and privacy, with no direct impact on system integrity or availability.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first check for and apply any official patches or updates released by the plugin vendor once available. In the absence of patches, administrators should restrict Subscriber-level user capabilities to the minimum necessary, potentially disabling or limiting access to the affected plugin functions. Implementing strict role-based access controls (RBAC) and auditing user permissions can reduce exposure. Additionally, monitoring logs for unusual access patterns to invoice or user data endpoints can help detect exploitation attempts. If feasible, temporarily disabling the Invoct plugin until a fix is released may be warranted for high-risk environments. Web application firewalls (WAFs) can be configured to block suspicious requests targeting the vulnerable functions. Educating users about phishing risks stemming from leaked email addresses is also advisable. Finally, organizations should maintain regular backups and ensure their WordPress and WooCommerce installations are kept up to date to reduce overall attack surface.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2026-1748: CWE-862 Missing Authorization in kirilkirkov Invoct – PDF Invoices & Billing for WooCommerce
Description
The Invoct – PDF Invoices & Billing for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple functions in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve invoice clients, invoice items, and list of WordPress users along with their emails.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The vulnerability identified as CVE-2026-1748 affects the Invoct – PDF Invoices & Billing for WooCommerce plugin, a widely used WordPress extension for generating PDF invoices and managing billing. The root cause is a missing authorization (CWE-862) capability check on multiple plugin functions, which means that the plugin fails to verify whether an authenticated user has the necessary permissions before granting access to sensitive data. Specifically, attackers with Subscriber-level access or higher can retrieve invoice client details, invoice items, and lists of WordPress users including their email addresses. This issue exists in all versions up to and including 1.6. The vulnerability can be exploited remotely over the network without user interaction, leveraging the low privilege level of Subscriber accounts, which are commonly assigned to registered users on WordPress sites. The CVSS v3.1 base score is 4.3, reflecting a medium severity level primarily due to the confidentiality impact and ease of exploitation without user interaction. The vulnerability does not impact data integrity or system availability. No patches or official fixes have been linked yet, and no known exploits have been reported in the wild as of the publication date. The flaw exposes sensitive customer and user information, which could be leveraged for further attacks such as phishing or social engineering.
Potential Impact
The primary impact of CVE-2026-1748 is unauthorized disclosure of sensitive data, including invoice details and user email addresses. This can lead to privacy violations, regulatory compliance issues (e.g., GDPR), and reputational damage for organizations using the affected plugin. Attackers gaining access to invoice and user data could conduct targeted phishing campaigns or identity theft. Although the vulnerability does not allow modification or deletion of data, the exposure of confidential business and customer information can undermine trust and potentially lead to financial losses. Since the exploit requires only Subscriber-level access, which is commonly granted to registered users or customers, the attack surface is broad. Organizations with WooCommerce stores using this plugin are at risk, especially those handling sensitive billing information. The lack of known exploits in the wild reduces immediate risk but does not eliminate the threat, as attackers may develop exploits in the future. Overall, the vulnerability poses a moderate risk to confidentiality and privacy, with no direct impact on system integrity or availability.
Mitigation Recommendations
To mitigate this vulnerability, organizations should first check for and apply any official patches or updates released by the plugin vendor once available. In the absence of patches, administrators should restrict Subscriber-level user capabilities to the minimum necessary, potentially disabling or limiting access to the affected plugin functions. Implementing strict role-based access controls (RBAC) and auditing user permissions can reduce exposure. Additionally, monitoring logs for unusual access patterns to invoice or user data endpoints can help detect exploitation attempts. If feasible, temporarily disabling the Invoct plugin until a fix is released may be warranted for high-risk environments. Web application firewalls (WAFs) can be configured to block suspicious requests targeting the vulnerable functions. Educating users about phishing risks stemming from leaked email addresses is also advisable. Finally, organizations should maintain regular backups and ensure their WordPress and WooCommerce installations are kept up to date to reduce overall attack surface.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-01T21:20:38.295Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698c3e544b57a58fa1832d2d
Added to database: 2/11/2026, 8:31:16 AM
Last enriched: 2/27/2026, 9:19:21 AM
Last updated: 4/7/2026, 2:19:28 AM
Views: 41
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.