Product Feed Manager for WooCommerce – CTX Feed – Support 220+ Shop…

Product Feed Manager for WooCommerce – CTX Feed – Support 220+ Shop…

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2026-22461 is a Medium-severity vulnerability (CVSS 5.3; CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) affecting Product Feed Manager for WooCommerce – CTX Feed – Support 220+ Shopping & Social Channels (slug: webappick-product-feed-for-woocommerce) in versions up to and including 6.6.18.

Because the issue can be triggered over the network and does not require a logged-in user, an attacker can attempt exploitation remotely against sites running vulnerable versions. No user interaction is required.

Official CVE record: https://www.cve.org/CVERecord?id=CVE-2026-22461

Security Weakness

The CTX Feed plugin is vulnerable due to a missing authorization (capability) check on a function in versions through 6.6.18. In practical terms, this means the plugin does not adequately verify that a request is allowed before performing an action.

As a result, unauthenticated attackers may be able to perform an unauthorized action through the affected function. (The public advisory describes the condition and impact at a high level without detailing the exact action.)

Remediation: Update CTX Feed to version 6.6.19 or newer (patched). Reference advisory source: Wordfence vulnerability report.

Technical or Business Impacts

While this CVE is rated Medium and the CVSS score indicates no direct confidentiality loss and no availability impact, it does indicate a risk of unauthorized changes (integrity impact). For ecommerce teams, integrity issues are often the most business-relevant: they can undermine the accuracy and trustworthiness of automation that supports revenue-generating channels.

Depending on what the unauthorized action enables in your environment, potential business impacts may include: disruption or manipulation of product feed operations, incorrect product listings on shopping/social channels, brand damage from mismatched pricing/availability, and additional operational workload for marketing and ecommerce teams to diagnose and correct downstream issues.

For compliance and risk stakeholders, the key takeaway is governance: a missing authorization check can allow actions outside approved workflows, reducing confidence in auditability and change control around commerce-related integrations.

Similar Attacks

Missing authorization and exposed functionality in WordPress components has driven high-impact incidents in the past. Examples to be aware of:

CVE-2020-25213 (File Manager plugin) — unauthenticated attackers could upload files leading to remote code execution
WordPress 4.7.2 Security Release — addressed REST API content injection issues impacting site integrity
CVE-2021-29447 (WordPress core) — media handling flaw that could be abused in certain configurations

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers