Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3589: CWE-352 Cross-Site Request Forgery (CSRF) in Automattic WooCommerce

0
Critical
VulnerabilityCVE-2026-3589cvecve-2026-3589cwe-352
Published: Fri Mar 06 2026 (03/06/2026, 09:11:10 UTC)
Source: CVE Database V5
Vendor/Project: Automattic
Product: WooCommerce

Description

CVE-2026-3589 is a Cross-Site Request Forgery (CSRF) vulnerability in the WooCommerce WordPress plugin versions 5. 4. 0 through 10. 5. 2. The flaw arises from improper handling of batch requests, allowing unauthenticated attackers to trigger actions as if performed by a logged-in admin. Exploitation can lead to the creation of arbitrary admin users, compromising site integrity and control. No authentication or user interaction is required for exploitation, increasing the risk. Although no known exploits are reported in the wild yet, the vulnerability poses a significant threat to WooCommerce sites globally. The vulnerability affects a wide range of WooCommerce versions, which is a widely used e-commerce platform on WordPress.

AI-Powered Analysis

AILast updated: 03/06/2026, 09:45:24 UTC

Technical Analysis

CVE-2026-3589 is a security vulnerability classified under CWE-352 (Cross-Site Request Forgery) affecting the WooCommerce plugin for WordPress, specifically versions 5.4.0 through 10.5.2. The vulnerability stems from improper handling of batch requests within the plugin's REST API endpoints. Normally, CSRF attacks require tricking an authenticated user into submitting a malicious request. However, in this case, the flaw allows unauthenticated users to invoke admin-level REST API calls by exploiting the batch request mechanism, bypassing typical authentication and authorization checks. This can enable attackers to create arbitrary admin users on the affected WordPress site without any user interaction or prior authentication. The creation of unauthorized admin accounts grants attackers full control over the site, including the ability to modify content, install malicious plugins, steal sensitive data, or disrupt operations. The vulnerability affects a broad range of WooCommerce versions spanning multiple years, indicating a long-standing issue. Despite no public exploits reported yet, the severity of the impact and ease of exploitation make this a critical risk for site administrators. The lack of a CVSS score suggests the need for a manual severity assessment. Given the potential for full site compromise and the absence of required authentication, this vulnerability demands urgent attention from organizations using WooCommerce.

Potential Impact

The impact of CVE-2026-3589 is severe for organizations running WooCommerce-based e-commerce sites. Successful exploitation allows attackers to escalate privileges by creating arbitrary admin users, effectively granting full control over the affected WordPress installation. This can lead to unauthorized data access, data manipulation, defacement, installation of backdoors or malware, and disruption of e-commerce operations. For businesses relying on WooCommerce for online sales, this could result in significant financial losses, reputational damage, and regulatory compliance issues, especially if customer data is compromised. The vulnerability's ability to be exploited without authentication or user interaction increases the attack surface and likelihood of automated attacks. Given WooCommerce's widespread adoption globally, the potential scale of impact is substantial, affecting small businesses to large enterprises. The absence of known exploits in the wild currently may reduce immediate risk, but the vulnerability remains a critical threat until patched.

Mitigation Recommendations

To mitigate CVE-2026-3589, organizations should immediately upgrade WooCommerce to a patched version once available from Automattic. Until a patch is released, administrators should implement the following specific measures: 1) Restrict access to the WordPress REST API endpoints by configuring web application firewalls (WAFs) or server-level rules to block unauthorized batch requests, especially those targeting admin-level endpoints. 2) Employ strict Content Security Policy (CSP) headers and SameSite cookie attributes to reduce CSRF attack vectors. 3) Limit admin user creation permissions to trusted IP addresses or through multi-factor authentication (MFA) to reduce risk if exploitation occurs. 4) Monitor logs for unusual REST API activity or unexpected user account creations. 5) Disable batch request functionality if feasible via plugin settings or custom code hooks until patched. 6) Educate site administrators about the risk and signs of compromise. These targeted mitigations go beyond generic advice by focusing on the specific attack vector and REST API abuse inherent in this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
WPScan
Date Reserved
2026-03-05T10:41:21.729Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69aa9ed9c48b3f10ff40a463

Added to database: 3/6/2026, 9:31:05 AM

Last enriched: 3/6/2026, 9:45:24 AM

Last updated: 3/6/2026, 3:04:50 PM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses