Live sales notification for WooCommerce Vulnerability (Medium) – CV…

Live sales notification for WooCommerce Vulnerability (Medium) – CV…

by | Feb 26, 2026 | Plugins

Attack Vectors

The vulnerability CVE-2026-27066 affects the WordPress plugin Live sales notification for WooCommerce (slug: live-sales-notifications-for-woocommerce) in versions up to and including 2.3.46. Because the issue is remotely reachable and does not require a logged-in user, an attacker can attempt exploitation over the internet against any site running the affected plugin.

From a business-risk perspective, this is the type of exposure that can be probed at scale: attackers can automatically scan for WooCommerce sites and then test the vulnerable functionality without needing credentials, user interaction, or a foothold on the server.

Security Weakness

This is a missing authorization (capability check) issue. In practical terms, a plugin function that should verify whether a user is allowed to perform an action does not adequately enforce that requirement in versions through 2.3.46.

Wordfence rates this vulnerability as Medium severity (CVSS 5.3, vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N). While it is not described as enabling data theft or service disruption, it does allow an unauthenticated attacker to perform an unauthorized action, which can undermine the integrity of your site operations.

Technical or Business Impacts

Even when the stated impact is limited to integrity (I:L), unauthorized actions can translate into business problems such as unexpected changes to site behavior, disruption of marketing campaigns, or erosion of customer trust—especially on revenue-driving pages where WooCommerce is central to conversions.

For leadership and compliance stakeholders, the risk is amplified by the current remediation status: no known patch is available. That means your risk decisions are operational rather than purely technical—e.g., whether to accept exposure, apply compensating controls, or replace the plugin.

Practical mitigations to consider based on your organization’s risk tolerance include uninstalling the affected plugin and replacing it, limiting exposure to administrative endpoints (where feasible), increasing monitoring for unexpected changes in WooCommerce/WordPress behavior, and using a web application firewall (WAF) rule set that can help reduce automated probing. Validate any mitigation steps in a staging environment to avoid impacting revenue-critical checkout and product flows.

Similar Attacks

Missing authorization checks have a long track record of being exploited at scale in web platforms, including WordPress components. A well-known example is the WordPress REST API content injection vulnerability (CVE-2017-1001000), which demonstrated how widespread issues can become when an unauthenticated pathway allows unauthorized actions.

For tracking and internal reporting, reference the originating write-up from Wordfence: Wordfence vulnerability record.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers