UNKNOWN (0.0)
    Plugin

    CSRF Vulnerability in WP eCommerce Plugin Allows Unauthorized Coupon Deletion

    Published Date: 3/6/2026
    CVE ID: CVE-2026-1128

    Summary

    The WP eCommerce plugin through version 3.15.1 is vulnerable to cross-site request forgery (CSRF) attacks due to the absence of CSRF checks when deleting coupons. This enables potential attackers to trick an authenticated admin into inadvertently deleting coupons.

    Vulnerability Details

    The vulnerability in the WP eCommerce plugin arises from a lack of CSRF protection mechanisms when performing actions related to coupon deletion. Without CSRF checks, an attacker can craft a malicious request that appears legitimate and persuade or trick a logged-in administrator into executing it. This occurs because the plugin fails to verify the source of the request, allowing it to be executed even if it comes from an untrusted domain. The consequence of this is significant as it allows attackers to manipulate coupon data, potentially affecting sales and promotions without the website owner's consent or awareness. Overall, this vulnerability exposes sites using the WP eCommerce plugin to risks associated with unauthorized coupon management.

    Recommendations

    To mitigate this vulnerability, ensure that all requests involving the deletion of sensitive data such as coupons incorporate CSRF tokens. Educate administrators to be cautious about following links or executing actions from untrusted sources while logged into WordPress, as a precautionary measure against CSRF attacks. Regular security training and reminders about the importance of logging out when not managing the site can also help reduce the effectiveness of potential attacks.

    Available Fixes

    Last Updated: 3/7/2026
    Jedar

    Jedar for Digital Rights is a non-profit organization dedicated to protecting digital freedoms, enhancing online privacy, and promoting secure digital practices for vulnerable communities worldwide.

    Follow Us

    All Rights Reserved © 2026 Jedar for Digital Rights.

    Cookie Preferences

    We use cookies to enhance your browsing experience, serve personalized ads or content, and analyze our traffic. By clicking "Accept All", you consent to our use of cookies.

    Learn More