WP eCommerce Vulnerability (High) – CVE-2026-1235

WP eCommerce Vulnerability (High) – CVE-2026-1235

by | Feb 25, 2026 | Plugins

Attack Vectors

WP eCommerce (slug: wp-e-commerce) versions up to and including 3.15.1 are affected by a High-severity vulnerability (CVSS 8.1) identified as CVE-2026-1235.

The primary exposure is that the issue is described as unauthenticated, meaning an attacker does not need a valid user account to attempt exploitation over the internet. In practical business terms, any public-facing WordPress site using the affected plugin version may be reachable by automated scanning and opportunistic attacks.

While the vulnerable plugin itself is reported to have no known POP chain, attackers may still probe sites because a POP chain can sometimes be introduced by other installed plugins or themes. This is why the risk can increase over time as websites change and add components.

Security Weakness

The reported weakness is PHP Object Injection caused by deserialization of untrusted input. Put simply, the site may accept certain data from outside and process it in a way that can be unsafe if an attacker crafts the input.

According to the advisory, exploitation becomes significantly more dangerous if a suitable “gadget chain” (POP chain) exists elsewhere in the WordPress environment. This makes the overall risk dependent not only on WP eCommerce, but also on the full stack of active plugins, themes, and custom code.

Notably, there is no known patch available at this time. That changes the risk decision from “update quickly” to “mitigate or replace,” which is especially important for organizations with compliance requirements or low tolerance for customer-data exposure.

Technical or Business Impacts

If a POP chain is available via another plugin or theme, attackers could potentially delete arbitrary files, retrieve sensitive data, or execute code—impacts that can translate into outages, defacement, malware distribution, fraudulent transactions, and loss of customer trust.

From a leadership and compliance perspective, the biggest concerns are: (1) the vulnerability is reachable without login, (2) it may lead to high-impact outcomes depending on the wider WordPress environment, and (3) there is no vendor patch to rely on. This combination can increase the likelihood of unplanned downtime, incident-response costs, and potential regulatory exposure if customer or order data is accessed.

Given the lack of a patch, mitigation should be aligned to your risk tolerance. Many organizations will consider it safest to uninstall WP eCommerce and replace it, particularly on revenue-generating storefronts. If immediate removal is not feasible, consider compensating controls such as tightening exposure (e.g., limiting access paths where possible), increasing monitoring and alerting, reviewing the necessity of other plugins/themes that could introduce a POP chain, and ensuring tested backups and restoration procedures are in place.

Reference: Wordfence advisory source for this issue: Wordfence Threat Intel.

Similar Attacks

Unsafe deserialization and object injection have been used in major real-world incidents across common web platforms. Examples include:

CVE-2015-8562 (Joomla) — Object Injection / Remote Code Execution
CVE-2019-6340 (Drupal) — Unsafe Deserialization leading to Remote Code Execution
CVE-2017-9805 (Apache Struts 2) — REST plugin RCE tied to unsafe deserialization patterns

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers