CVE-2026-1748: CWE-862 Missing Authorization in kirilkirkov Invoct – PDF Invoices & Billing for WooCommerce
The Invoct – PDF Invoices & Billing for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple functions in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve invoice clients, invoice items, and list of WordPress users along with their emails.
AI Analysis
Technical Summary
CVE-2026-1748 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Invoct – PDF Invoices & Billing for WooCommerce plugin for WordPress. This plugin is widely used to generate PDF invoices and manage billing within WooCommerce-based e-commerce sites. The vulnerability arises because multiple functions within the plugin lack proper capability checks, allowing users with Subscriber-level privileges or higher to access sensitive information without proper authorization. Specifically, attackers can retrieve invoice client data, invoice items, and lists of WordPress users along with their email addresses. Since the vulnerability requires only authenticated access at a low privilege level and no user interaction, it is relatively easy to exploit within compromised or low-trust environments. The CVSS 3.1 base score is 4.3, reflecting a medium severity primarily due to the confidentiality impact and ease of exploitation. The flaw does not affect data integrity or availability, and no known exploits have been reported in the wild as of the publication date. The vulnerability affects all versions of the plugin up to and including 1.6, and no official patches have been linked yet. The issue was publicly disclosed on February 11, 2026, by Wordfence. This vulnerability poses a risk of sensitive data leakage, which could facilitate further attacks such as phishing or social engineering if exploited.
Potential Impact
For European organizations using WooCommerce with the Invoct plugin, this vulnerability could lead to unauthorized disclosure of customer invoice data and user email addresses. This exposure can undermine customer privacy, violate GDPR regulations, and damage organizational reputation. Attackers with minimal privileges could harvest data to conduct targeted phishing campaigns or escalate attacks within the network. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach alone is significant, especially for businesses handling sensitive financial information. The impact is heightened in sectors such as retail, finance, and services where WooCommerce is prevalent. Organizations failing to restrict Subscriber-level access or monitor plugin usage may be more vulnerable. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the vulnerability details. Compliance with European data protection laws mandates prompt remediation to avoid legal and financial penalties.
Mitigation Recommendations
1. Monitor official sources for a security patch or update from the plugin developer and apply it immediately upon release. 2. Until a patch is available, restrict Subscriber-level user access to trusted individuals only and review user roles to minimize unnecessary privileges. 3. Implement strict access controls and audit logs to detect unusual access patterns to invoice and user data. 4. Use Web Application Firewalls (WAFs) to monitor and potentially block suspicious requests targeting the vulnerable plugin endpoints. 5. Conduct regular security assessments and penetration tests focusing on WordPress plugins and user privilege escalations. 6. Educate administrators and users about the risks of unauthorized data access and enforce strong authentication mechanisms. 7. Consider disabling or replacing the Invoct plugin if immediate patching is not feasible and sensitive data exposure risk is unacceptable. 8. Ensure backups and incident response plans are in place to quickly respond to any data breaches stemming from this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1748: CWE-862 Missing Authorization in kirilkirkov Invoct – PDF Invoices & Billing for WooCommerce
Description
The Invoct – PDF Invoices & Billing for WooCommerce plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on multiple functions in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to retrieve invoice clients, invoice items, and list of WordPress users along with their emails.
AI-Powered Analysis
Technical Analysis
CVE-2026-1748 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Invoct – PDF Invoices & Billing for WooCommerce plugin for WordPress. This plugin is widely used to generate PDF invoices and manage billing within WooCommerce-based e-commerce sites. The vulnerability arises because multiple functions within the plugin lack proper capability checks, allowing users with Subscriber-level privileges or higher to access sensitive information without proper authorization. Specifically, attackers can retrieve invoice client data, invoice items, and lists of WordPress users along with their email addresses. Since the vulnerability requires only authenticated access at a low privilege level and no user interaction, it is relatively easy to exploit within compromised or low-trust environments. The CVSS 3.1 base score is 4.3, reflecting a medium severity primarily due to the confidentiality impact and ease of exploitation. The flaw does not affect data integrity or availability, and no known exploits have been reported in the wild as of the publication date. The vulnerability affects all versions of the plugin up to and including 1.6, and no official patches have been linked yet. The issue was publicly disclosed on February 11, 2026, by Wordfence. This vulnerability poses a risk of sensitive data leakage, which could facilitate further attacks such as phishing or social engineering if exploited.
Potential Impact
For European organizations using WooCommerce with the Invoct plugin, this vulnerability could lead to unauthorized disclosure of customer invoice data and user email addresses. This exposure can undermine customer privacy, violate GDPR regulations, and damage organizational reputation. Attackers with minimal privileges could harvest data to conduct targeted phishing campaigns or escalate attacks within the network. Although the vulnerability does not allow modification or deletion of data, the confidentiality breach alone is significant, especially for businesses handling sensitive financial information. The impact is heightened in sectors such as retail, finance, and services where WooCommerce is prevalent. Organizations failing to restrict Subscriber-level access or monitor plugin usage may be more vulnerable. The lack of known exploits reduces immediate risk but does not eliminate the threat, as attackers could develop exploits given the vulnerability details. Compliance with European data protection laws mandates prompt remediation to avoid legal and financial penalties.
Mitigation Recommendations
1. Monitor official sources for a security patch or update from the plugin developer and apply it immediately upon release. 2. Until a patch is available, restrict Subscriber-level user access to trusted individuals only and review user roles to minimize unnecessary privileges. 3. Implement strict access controls and audit logs to detect unusual access patterns to invoice and user data. 4. Use Web Application Firewalls (WAFs) to monitor and potentially block suspicious requests targeting the vulnerable plugin endpoints. 5. Conduct regular security assessments and penetration tests focusing on WordPress plugins and user privilege escalations. 6. Educate administrators and users about the risks of unauthorized data access and enforce strong authentication mechanisms. 7. Consider disabling or replacing the Invoct plugin if immediate patching is not feasible and sensitive data exposure risk is unacceptable. 8. Ensure backups and incident response plans are in place to quickly respond to any data breaches stemming from this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-01T21:20:38.295Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698c3e544b57a58fa1832d2d
Added to database: 2/11/2026, 8:31:16 AM
Last enriched: 2/18/2026, 9:56:18 AM
Last updated: 2/21/2026, 12:17:36 AM
Views: 16
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.