Plattform
wordpress
Komponente
woo-bulk-editor
Behoben in
1.1.6
1.1.6
CVE-2026-1672 describes a Cross-Site Request Forgery (CSRF) vulnerability affecting the BEAR – Bulk Editor and Products Manager Professional for WooCommerce plugin for WordPress. This flaw allows unauthenticated attackers to manipulate WooCommerce product data, potentially leading to unauthorized modifications of pricing, descriptions, and other critical product attributes. The vulnerability impacts versions of the plugin up to and including 1.1.5, with a fix released in version 1.1.6.
An attacker exploiting this CSRF vulnerability could trick a site administrator or shop manager into unknowingly executing malicious requests. This could involve altering product prices to be significantly higher or lower, modifying product descriptions to include misleading information, or even deleting products entirely. The potential impact extends to financial losses due to incorrect pricing, reputational damage from inaccurate product information, and disruption of the e-commerce operations. Successful exploitation requires the attacker to lure a legitimate user into clicking a crafted link or visiting a malicious website, making social engineering a key component of the attack.
This vulnerability was publicly disclosed on 2026-04-07. No public proof-of-concept (POC) code has been released at the time of writing, but the ease of exploitation inherent in CSRF vulnerabilities suggests a potential for rapid exploitation. It is not currently listed on the CISA KEV catalog. The CVSS score of 6.5 (Medium) indicates a moderate risk level.
WordPress websites utilizing the BEAR – Bulk Editor and Products Manager Professional for WooCommerce plugin, particularly those with multiple administrators or shop managers, are at significant risk. Shared hosting environments where multiple websites share the same server resources are also potentially vulnerable if one site is running an outdated version of the plugin.
• wordpress / composer / npm:
wp plugin list | grep Pluginus.Net• wordpress / composer / npm:
wp plugin update BEAR --all• wordpress / composer / npm:
grep -r 'woobe_redraw_table_row()' /var/www/html/wp-content/plugins/bear-bulk-editor/disclosure
Exploit-Status
EPSS
0.01% (0% Perzentil)
CISA SSVC
CVSS-Vektor
The primary mitigation is to upgrade the BEAR WooCommerce Plugin to version 1.1.6 or later, which includes the necessary nonce validation to prevent CSRF attacks. As an interim measure, implement Web Application Firewall (WAF) rules to detect and block suspicious requests targeting the wooberedrawtable_row() function. Carefully review user permissions and restrict access to WooCommerce product management features to only authorized personnel. Regularly audit WooCommerce product data for any unauthorized changes.
Aktualisieren Sie auf Version 1.1.6 oder eine neuere gepatchte Version
Schwachstellenanalysen und kritische Warnungen direkt in deinen Posteingang.
CVE-2026-1672 is a Cross-Site Request Forgery (CSRF) vulnerability in the BEAR WooCommerce plugin for WordPress, affecting versions up to 1.1.5. It allows attackers to manipulate product data via forged requests.
You are affected if you are using the BEAR WooCommerce plugin version 1.1.5 or earlier. Check your plugin version and upgrade immediately.
Upgrade the BEAR WooCommerce plugin to version 1.1.6 or later. This resolves the missing nonce validation issue.
There are currently no known public exploits or active campaigns targeting this vulnerability, but it remains a risk due to the nature of CSRF attacks.
Refer to the Pluginus.Net website and WordPress plugin repository for the latest information and updates regarding this vulnerability.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.
Lade deine Abhängigkeitsdatei hoch und erfahre sofort, ob dich diese und andere CVEs treffen.