Cette page n'a pas encore été traduite dans votre langue. Affichage du contenu en anglais pendant que nous y travaillons.
💡 Keep dependencies up to date — most exploits target known, patchable vulnerabilities.
CVE-2026-6512: Authorization Bypass in InfusedWoo Pro
Plateforme
wordpress
Composant
infusedwooPRO
Corrigé dans
5.1.3
CVE-2026-6512 represents a critical authorization bypass vulnerability affecting the InfusedWoo Pro plugin for WordPress. This flaw allows unauthenticated attackers to perform destructive actions, including permanent deletion of critical data and modification of post statuses. The vulnerability impacts versions 0.0.0 through 5.1.2, and a patch is available in version 5.1.3.
Détecte cette CVE dans ton projet
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Impact et Scénarios d'Attaquetraduction en cours…
The impact of this vulnerability is severe due to the ease of exploitation and the potential for widespread data loss. An attacker can leverage this bypass to permanently delete posts, pages, products, and orders, effectively crippling an e-commerce site. The ability to mass-delete comments on any post can damage a site's reputation and user engagement. Furthermore, attackers can modify post statuses, potentially disrupting content publishing workflows and creating misleading information for users. This vulnerability's simplicity makes it a high-priority target for malicious actors.
Contexte d'Exploitationtraduction en cours…
CVE-2026-6512 was published on 2026-05-14. Currently, there are no publicly known active campaigns exploiting this vulnerability. The ease of exploitation, coupled with the plugin's popularity, suggests it could become a target. No KEV or EPSS score is currently available. Monitor security advisories and threat intelligence feeds for any indications of exploitation.
Renseignement sur les Menaces
Statut de l'Exploit
CISA SSVC
Vecteur CVSS
Que signifient ces métriques?
- Attack Vector
- Réseau — exploitable à distance via internet. Aucun accès physique ou local requis.
- Attack Complexity
- Faible — aucune condition spéciale requise. Exploitable de manière fiable.
- Privileges Required
- Aucun — sans authentification. Aucune identifiant requis pour exploiter.
- User Interaction
- Aucune — attaque automatique et silencieuse. La victime ne fait rien.
- Scope
- Inchangé — impact limité au composant vulnérable.
- Confidentiality
- Élevé — perte totale de confidentialité. L'attaquant peut lire toutes les données.
- Integrity
- Élevé — l'attaquant peut écrire, modifier ou supprimer toutes les données.
- Availability
- Aucun — aucun impact sur la disponibilité.
Logiciel Affecté
Classification de Faiblesse (CWE)
Chronologie
- Réservé
- Publiée
Mitigation et Contournementstraduction en cours…
The primary mitigation is to immediately upgrade the InfusedWoo Pro plugin to version 5.1.3 or later. If upgrading is not immediately feasible due to compatibility issues or breaking changes, consider temporarily restricting access to the plugin's administrative functions. Implement strict user role permissions within WordPress to limit the potential damage an attacker could inflict if they gain unauthorized access. While a WAF cannot directly prevent this authorization bypass, it can help detect and block suspicious requests attempting to exploit it. After upgrading, verify the fix by attempting to access plugin functions without proper authentication; successful access indicates the vulnerability persists.
Comment corriger
Mettre à jour vers la version 5.1.3, ou une version corrigée plus récente
Questions fréquentestraduction en cours…
What is CVE-2026-6512 — Authorization Bypass in InfusedWoo Pro?
CVE-2026-6512 is a critical authorization bypass vulnerability in the InfusedWoo Pro WordPress plugin, allowing unauthenticated attackers to delete data and modify post statuses. It affects versions 0.0.0 through 5.1.2.
Am I affected by CVE-2026-6512 in InfusedWoo Pro?
You are affected if you are using InfusedWoo Pro version 0.0.0 through 5.1.2. Check your plugin version and upgrade immediately if necessary.
How do I fix CVE-2026-6512 in InfusedWoo Pro?
Upgrade InfusedWoo Pro to version 5.1.3 or later to resolve this vulnerability. If immediate upgrade is not possible, restrict access to plugin administrative functions.
Is CVE-2026-6512 being actively exploited?
Currently, there are no publicly known active campaigns exploiting CVE-2026-6512, but its ease of exploitation makes it a potential target.
Where can I find the official InfusedWoo Pro advisory for CVE-2026-6512?
Refer to the official InfusedWoo Pro website or WordPress plugin repository for the latest advisory and update information regarding CVE-2026-6512.
Ton projet est-il affecté ?
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Détecte cette CVE dans ton projet
Téléverse ton fichier de dépendances et découvre instantanément si cette CVE et d'autres te touchent.
Scannez votre projet WordPress maintenant — sans compte
scanZone.subtitle
Glissez-déposez votre fichier de dépendances
composer.lock, package-lock.json, requirements.txt, Gemfile.lock, pubspec.lock, Dockerfile...