Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-31919: Missing Authorization in Josh Kohlbach Advanced Coupons for WooCommerce Coupons

0
Medium
VulnerabilityCVE-2026-31919cvecve-2026-31919
Published: Fri Mar 13 2026 (03/13/2026, 11:41:54 UTC)
Source: CVE Database V5
Vendor/Project: Josh Kohlbach
Product: Advanced Coupons for WooCommerce Coupons

Description

Missing Authorization vulnerability in Josh Kohlbach Advanced Coupons for WooCommerce Coupons advanced-coupons-for-woocommerce-free allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Advanced Coupons for WooCommerce Coupons: from n/a through <= 4.7.1.

AI-Powered Analysis

AILast updated: 03/13/2026, 13:32:35 UTC

Technical Analysis

CVE-2026-31919 identifies a Missing Authorization vulnerability in the Advanced Coupons for WooCommerce Coupons plugin by Josh Kohlbach, affecting versions up to 4.7.1. This vulnerability arises from incorrectly configured access control mechanisms within the plugin, which is designed to extend WooCommerce’s coupon functionality. Missing authorization means that certain actions related to coupon management—such as creating, modifying, or deleting coupons—can be performed by unauthorized users or attackers who should not have such privileges. The flaw compromises the integrity of the coupon system, potentially allowing attackers to manipulate discount codes, which could lead to financial losses, fraudulent transactions, or abuse of promotional campaigns. The vulnerability does not require user interaction but does require the attacker to reach the vulnerable plugin interface, which is typically accessible to authenticated users or possibly through other means if the access control is insufficiently enforced. No public exploits have been reported yet, and no CVSS score has been assigned. However, the vulnerability is critical for e-commerce environments relying on this plugin for coupon management. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for vigilance and interim protective measures. The plugin is widely used in WooCommerce installations, which powers a significant portion of online stores globally, making this vulnerability relevant to many organizations.

Potential Impact

The primary impact of this vulnerability is on the integrity and trustworthiness of the coupon system within WooCommerce stores using the Advanced Coupons plugin. Unauthorized actors could create or modify coupons to grant unintended discounts, resulting in direct financial losses and potential reputational damage. This could also disrupt marketing campaigns and customer loyalty programs. If attackers delete or alter coupons, it could cause operational disruptions and customer dissatisfaction. Additionally, the vulnerability could be leveraged as a foothold for further attacks within the e-commerce environment, potentially exposing other sensitive data or systems. The scope of affected systems is broad given WooCommerce’s extensive market penetration in e-commerce globally. The ease of exploitation depends on the attacker’s ability to access the vulnerable interface, but no user interaction is required once access is gained. The absence of authentication requirements or weak access controls would increase the risk substantially. Overall, the vulnerability poses a high risk to organizations relying on this plugin for coupon management.

Mitigation Recommendations

Organizations should immediately audit their WooCommerce installations to identify if the Advanced Coupons for WooCommerce Coupons plugin version 4.7.1 or earlier is in use. Until an official patch is released, restrict access to coupon management interfaces to trusted administrators only and implement additional access control measures such as IP whitelisting or multi-factor authentication for admin accounts. Monitor coupon creation and modification logs for unusual activity or unexpected coupon codes. Consider temporarily disabling the plugin if coupon functionality is not critical or if the risk is deemed unacceptable. Stay informed about vendor updates and apply patches promptly once available. Additionally, conduct regular security reviews of all e-commerce plugins and maintain a robust incident response plan to quickly address any exploitation attempts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting coupon management endpoints.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2026-03-10T10:59:45.899Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69b3fc682f860ef943d17879

Added to database: 3/13/2026, 12:00:40 PM

Last enriched: 3/13/2026, 1:32:35 PM

Last updated: 3/15/2026, 7:48:59 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses