Invoct – PDF Invoices & Billing for WooCommerce Vulnerability (Medi…

Invoct – PDF Invoices & Billing for WooCommerce Vulnerability (Medi…

by | Feb 10, 2026 | Plugins

Attack Vectors

CVE-2026-1748 affects the WordPress plugin Invoct – PDF Invoices & Billing for WooCommerce (slug: kirilkirkov-pdf-invoice-manager) in versions up to and including 1.6, with a Medium severity rating (CVSS 4.3). The issue enables an authenticated user with Subscriber-level access (or higher) to access information they should not be able to see.

From a business-risk perspective, the most realistic attack path is not an anonymous “drive-by” hack, but misuse of a legitimate login: a compromised low-privilege account, an overly broad internal account, a former contractor account that wasn’t removed, or a newly created account obtained through weak password practices. Because no user interaction is required to exploit this (per the CVSS vector), exposure can happen quickly once an attacker is logged in.

Security Weakness

The reported weakness is missing authorization (a missing capability check) in multiple functions within Invoct – PDF Invoices & Billing for WooCommerce <= 1.6. In plain terms: the plugin does not consistently verify that a logged-in user is permitted to access certain invoice and user-related data.

This matters because WordPress roles are designed to limit what a Subscriber can view and do. When a plugin bypasses those guardrails, even “low privilege” accounts can become a gateway to sensitive business information.

The disclosed exposure includes invoice clients, invoice items, and a list of WordPress users along with their email addresses. Even if this does not directly change site content or payment settings, it can still elevate real-world risk by revealing customer and internal contact data.

Technical or Business Impacts

The immediate business impact of CVE-2026-1748 is data exposure. For marketing directors and executives, that translates into practical downstream risk: targeted phishing campaigns using real names and emails, customer trust damage, and potential compliance and notification obligations depending on what data was accessed and your regulatory environment.

Because the vulnerability exposes invoice-related details, it may also enable convincing business email compromise (BEC) and invoice fraud scenarios. Attackers who can see invoice clients and items may craft highly credible “payment update” messages or impersonate finance workflows, increasing the likelihood of successful fraud attempts.

Operationally, incidents like this often create unplanned costs: incident response time, customer support workload, legal/compliance review, and reputational impact that can affect conversion rates and retention.

Remediation note: there is no known patch available at this time for affected versions (up to 1.6). Organizations should evaluate mitigations based on risk tolerance; in many cases, the safest path is to uninstall the affected plugin and replace it with a supported alternative, while also reviewing who has Subscriber (or higher) access and tightening account controls.

Similar Attacks

Authorization gaps and data exposure issues in popular platforms are frequently leveraged for targeted phishing and account takeover efforts. For context, here are a few well-known examples of real-world incidents and vulnerability disclosures involving unauthorized access or data exposure:

Uber (2022) security incident update — an example of how account compromise and internal access can quickly escalate into broader organizational risk.

MOVEit Transfer vulnerability (2023) CISA alert — illustrates how data access flaws can drive major regulatory and reputational impacts when sensitive information is exposed.

Log4j (2021) CISA alert — a widely abused vulnerability demonstrating how quickly attackers operationalize security gaps to reach data and systems at scale.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers