CVE-2026-1906: CWE-862 Missing Authorization in wpovernight PDF Invoices & Packing Slips for WooCommerce
The PDF Invoices & Packing Slips for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.6.0 via the `wpo_ips_edi_save_order_customer_peppol_identifiers` AJAX action due to missing capability checks and order ownership validation. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify Peppol/EDI endpoint identifiers (`peppol_endpoint_id`, `peppol_endpoint_eas`) for any customer by specifying an arbitrary `order_id` parameter on systems using Peppol invoicing. This can affect order routing on the Peppol network and may result in payment disruptions and data leakage.
AI Analysis
Technical Summary
CVE-2026-1906 is a vulnerability classified under CWE-862 (Missing Authorization) found in the PDF Invoices & Packing Slips for WooCommerce plugin for WordPress, affecting all versions up to and including 5.6.0. The flaw exists in the AJAX action 'wpo_ips_edi_save_order_customer_peppol_identifiers', which lacks proper capability checks and validation of order ownership. This allows any authenticated user with at least Subscriber-level privileges to specify an arbitrary 'order_id' parameter and modify Peppol/EDI endpoint identifiers such as 'peppol_endpoint_id' and 'peppol_endpoint_eas' for orders they do not own. Peppol is a widely used e-invoicing network in Europe, and these identifiers are critical for correct order routing and invoicing. By altering these identifiers, an attacker can redirect invoices or disrupt the invoicing process, potentially causing payment delays or failures. Additionally, this may lead to leakage of sensitive order routing information. The vulnerability does not require user interaction but does require authentication, making it exploitable by any logged-in user, including low-privilege roles. The CVSS v3.1 base score is 4.3 (medium), reflecting the limited impact on confidentiality and availability but notable integrity concerns. No patches were linked at the time of publication, and no known exploits have been reported in the wild. The vulnerability highlights the importance of enforcing strict authorization and ownership validation in AJAX handlers that modify sensitive data in e-commerce plugins.
Potential Impact
For European organizations, especially those using WooCommerce with the PDF Invoices & Packing Slips plugin and Peppol e-invoicing, this vulnerability can disrupt critical business processes. Manipulation of Peppol endpoint identifiers can cause invoices to be misrouted or rejected on the Peppol network, leading to payment delays or failures that affect cash flow and supplier relationships. Data leakage risks arise from unauthorized modification of order-related identifiers, potentially exposing sensitive business information. Given Peppol's widespread adoption in Europe for compliant e-invoicing, organizations in countries with strong e-invoicing mandates (e.g., Germany, France, Netherlands, Italy, Spain, and the Nordics) are at higher risk. Attackers with minimal privileges can exploit this flaw, increasing the threat surface. While the vulnerability does not directly impact system availability or confidentiality, the integrity compromise can have significant operational and financial consequences. Additionally, regulatory compliance risks may arise if invoicing data integrity is compromised.
Mitigation Recommendations
Organizations should immediately audit their WooCommerce installations to identify the use of the vulnerable PDF Invoices & Packing Slips plugin versions (up to 5.6.0). Until an official patch is released, administrators should restrict Subscriber-level and other low-privilege user capabilities to prevent unauthorized access to the AJAX action 'wpo_ips_edi_save_order_customer_peppol_identifiers'. This can be done by customizing WordPress capability settings or using security plugins to block or monitor suspicious AJAX requests targeting this endpoint. Implementing web application firewall (WAF) rules to detect and block anomalous requests with arbitrary 'order_id' parameters can reduce exploitation risk. Monitoring logs for unusual modifications to Peppol endpoint identifiers is advised. Once a patch is available, prompt application is critical. Additionally, organizations should review and harden their WooCommerce and WordPress security posture by enforcing least privilege principles, validating user inputs rigorously, and conducting regular security assessments focused on e-commerce plugins handling sensitive data.
Affected Countries
Germany, France, Netherlands, Italy, Spain, Sweden, Denmark, Finland, Norway, Belgium
CVE-2026-1906: CWE-862 Missing Authorization in wpovernight PDF Invoices & Packing Slips for WooCommerce
Description
The PDF Invoices & Packing Slips for WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.6.0 via the `wpo_ips_edi_save_order_customer_peppol_identifiers` AJAX action due to missing capability checks and order ownership validation. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify Peppol/EDI endpoint identifiers (`peppol_endpoint_id`, `peppol_endpoint_eas`) for any customer by specifying an arbitrary `order_id` parameter on systems using Peppol invoicing. This can affect order routing on the Peppol network and may result in payment disruptions and data leakage.
AI-Powered Analysis
Technical Analysis
CVE-2026-1906 is a vulnerability classified under CWE-862 (Missing Authorization) found in the PDF Invoices & Packing Slips for WooCommerce plugin for WordPress, affecting all versions up to and including 5.6.0. The flaw exists in the AJAX action 'wpo_ips_edi_save_order_customer_peppol_identifiers', which lacks proper capability checks and validation of order ownership. This allows any authenticated user with at least Subscriber-level privileges to specify an arbitrary 'order_id' parameter and modify Peppol/EDI endpoint identifiers such as 'peppol_endpoint_id' and 'peppol_endpoint_eas' for orders they do not own. Peppol is a widely used e-invoicing network in Europe, and these identifiers are critical for correct order routing and invoicing. By altering these identifiers, an attacker can redirect invoices or disrupt the invoicing process, potentially causing payment delays or failures. Additionally, this may lead to leakage of sensitive order routing information. The vulnerability does not require user interaction but does require authentication, making it exploitable by any logged-in user, including low-privilege roles. The CVSS v3.1 base score is 4.3 (medium), reflecting the limited impact on confidentiality and availability but notable integrity concerns. No patches were linked at the time of publication, and no known exploits have been reported in the wild. The vulnerability highlights the importance of enforcing strict authorization and ownership validation in AJAX handlers that modify sensitive data in e-commerce plugins.
Potential Impact
For European organizations, especially those using WooCommerce with the PDF Invoices & Packing Slips plugin and Peppol e-invoicing, this vulnerability can disrupt critical business processes. Manipulation of Peppol endpoint identifiers can cause invoices to be misrouted or rejected on the Peppol network, leading to payment delays or failures that affect cash flow and supplier relationships. Data leakage risks arise from unauthorized modification of order-related identifiers, potentially exposing sensitive business information. Given Peppol's widespread adoption in Europe for compliant e-invoicing, organizations in countries with strong e-invoicing mandates (e.g., Germany, France, Netherlands, Italy, Spain, and the Nordics) are at higher risk. Attackers with minimal privileges can exploit this flaw, increasing the threat surface. While the vulnerability does not directly impact system availability or confidentiality, the integrity compromise can have significant operational and financial consequences. Additionally, regulatory compliance risks may arise if invoicing data integrity is compromised.
Mitigation Recommendations
Organizations should immediately audit their WooCommerce installations to identify the use of the vulnerable PDF Invoices & Packing Slips plugin versions (up to 5.6.0). Until an official patch is released, administrators should restrict Subscriber-level and other low-privilege user capabilities to prevent unauthorized access to the AJAX action 'wpo_ips_edi_save_order_customer_peppol_identifiers'. This can be done by customizing WordPress capability settings or using security plugins to block or monitor suspicious AJAX requests targeting this endpoint. Implementing web application firewall (WAF) rules to detect and block anomalous requests with arbitrary 'order_id' parameters can reduce exploitation risk. Monitoring logs for unusual modifications to Peppol endpoint identifiers is advised. Once a patch is available, prompt application is critical. Additionally, organizations should review and harden their WooCommerce and WordPress security posture by enforcing least privilege principles, validating user inputs rigorously, and conducting regular security assessments focused on e-commerce plugins handling sensitive data.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-02-04T15:19:56.700Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6995557f80d747be2043e618
Added to database: 2/18/2026, 6:00:31 AM
Last enriched: 2/18/2026, 6:15:13 AM
Last updated: 2/20/2026, 10:23:06 PM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2858: Out-of-Bounds Read in wren-lang wren
MediumCVE-2026-27120: CWE-75: Failure to Sanitize Special Elements into a Different Plane (Special Element Injection) in vapor leaf-kit
MediumCVE-2026-27118: CWE-346: Origin Validation Error in sveltejs kit
MediumCVE-2026-27112: CWE-863: Incorrect Authorization in akuity kargo
CriticalCVE-2026-27111: CWE-862: Missing Authorization in akuity kargo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.