Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-24366: Missing Authorization in YITHEMES YITH WooCommerce Request A Quote

0
Medium
VulnerabilityCVE-2026-24366cvecve-2026-24366
Published: Thu Jan 22 2026 (01/22/2026, 16:52:44 UTC)
Source: CVE Database V5
Vendor/Project: YITHEMES
Product: YITH WooCommerce Request A Quote

Description

Missing Authorization vulnerability in YITHEMES YITH WooCommerce Request A Quote yith-woocommerce-request-a-quote allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects YITH WooCommerce Request A Quote: from n/a through <= 2.46.0.

AI-Powered Analysis

AILast updated: 01/22/2026, 17:25:49 UTC

Technical Analysis

CVE-2026-24366 identifies a Missing Authorization vulnerability in the YITHEMES YITH WooCommerce Request A Quote plugin, affecting versions up to 2.46.0. This vulnerability arises from improperly configured access control mechanisms that fail to verify whether a user is authorized to perform certain actions within the plugin. Specifically, the plugin does not enforce adequate authorization checks on requests related to quote submissions or management, potentially allowing unauthenticated or unauthorized users to exploit these functionalities. The flaw is rooted in incorrect or absent validation of user permissions, which is a critical security oversight in web applications handling sensitive e-commerce operations. While no public exploits have been reported, the vulnerability could be leveraged to manipulate quote requests, access confidential pricing information, or disrupt normal business processes. The plugin is widely used in WooCommerce installations, which are prevalent in European e-commerce platforms, increasing the attack surface. The absence of a CVSS score indicates that the vulnerability is newly disclosed, but the nature of missing authorization typically results in high risk due to the direct impact on confidentiality and integrity. The vulnerability does not require user interaction but may not require authentication, increasing its exploitability. The vendor has not yet released a patch, so mitigation currently relies on configuration reviews and access restrictions.

Potential Impact

For European organizations, this vulnerability could lead to unauthorized access to sensitive business data such as pricing and quote requests, potentially resulting in financial losses or reputational damage. Attackers might manipulate or submit fraudulent quote requests, disrupting sales workflows and customer trust. Given the widespread use of WooCommerce in Europe, especially among SMEs and large retailers, exploitation could affect a broad range of sectors including retail, manufacturing, and services. The lack of proper authorization checks could also facilitate lateral movement within compromised e-commerce environments, increasing the risk of further breaches. Additionally, regulatory compliance issues may arise if customer or business data is exposed, particularly under GDPR mandates. The impact is heightened in countries with mature e-commerce markets and stringent data protection laws, where breaches could lead to significant legal and financial penalties.

Mitigation Recommendations

Organizations should immediately audit their WooCommerce installations to identify if the YITH WooCommerce Request A Quote plugin is in use and determine the version. Until an official patch is released, restrict access to the plugin’s quote request functionalities by implementing web application firewall (WAF) rules that block unauthorized requests targeting the plugin endpoints. Review and tighten user roles and permissions within WordPress to ensure only trusted users can access quote-related features. Monitor logs for unusual activity related to quote requests or plugin endpoints. Consider temporarily disabling the plugin if it is not critical to business operations. Stay informed about vendor updates and apply patches promptly once available. Additionally, conduct penetration testing focused on authorization controls in the e-commerce environment to detect similar weaknesses. Employ network segmentation to isolate e-commerce systems and limit potential lateral movement in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-01-22T14:42:32.873Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259324623b1157c7fb4d4

Added to database: 1/22/2026, 5:06:58 PM

Last enriched: 1/22/2026, 5:25:49 PM

Last updated: 2/4/2026, 10:37:36 PM

Views: 43

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats