Agrofood – Elementor WooCommerce WordPress Theme Vulnerability (Med…

Agrofood – Elementor WooCommerce WordPress Theme Vulnerability (Med…

by | Mar 18, 2026 | Themes

Attack Vectors

CVE-2026-27332 is a Medium-severity (CVSS 6.1) Reflected Cross-Site Scripting (XSS) issue affecting the Agrofood – Elementor WooCommerce WordPress Theme (slug: agrofood) in versions prior to 1.4.0. Because this is a reflected XSS, an attacker typically delivers a specially crafted URL (for example via email, direct message, social media, or a malicious ad) that includes injected script content.

The attacker does not need to be logged in. The attack succeeds when a staff member, contractor, or customer is tricked into clicking the link or otherwise loading the crafted page. From a business perspective, this is often used in targeted phishing campaigns against marketing teams and site administrators, where trust in brand emails and links is high.

Security Weakness

According to the published advisory, Agrofood versions up to (but excluding) 1.4.0 are vulnerable due to insufficient input sanitization and output escaping. In practical terms, the theme can accept untrusted input and then display it back to the user in a way that allows browser-executed scripts to run.

Because the code executes in the victim’s browser within the context of your website, it can abuse the trust users place in your domain. The issue is documented as CVE-2026-27332, with additional details referenced by Wordfence’s vulnerability intelligence.

Technical or Business Impacts

Even at Medium severity, reflected XSS can create disproportionate business risk when it targets the people who manage campaigns, content, and customer communications. Potential impacts include:

Brand and customer-trust damage: Attackers can craft links that appear to come from your site and trigger unexpected behavior, undermining trust in marketing campaigns and landing pages.

Account and session risk: If an authenticated user (such as an editor or administrator) clicks a malicious link, the attacker’s script may be able to perform actions in the user’s browser “as them,” depending on browser protections, site configuration, and what the theme outputs on the affected page.

Compliance and incident costs: XSS-driven incidents can lead to internal investigations, legal/compliance reviews, and additional security spend—especially if the attack chain results in unauthorized changes to site content, customer-facing pages, or tracking/analytics scripts.

Campaign disruption: Marketing operations may be forced to pause promotions, rotate credentials, and rebuild landing pages while the issue is contained and remediated.

Similar Attacks

XSS vulnerabilities are commonly leveraged to support phishing, session manipulation, and malicious script injection. Comparable, publicly documented examples include:

CVE-2022-21661 (WordPress) – Stored XSS

CVE-2020-11022 (jQuery) – XSS via HTML prefilter behavior

Recommended remediation for this specific issue is to update Agrofood to version 1.4.0 or newer (patched). As a business control, prioritize this update on any site used for lead generation, ecommerce, or campaign landing pages where staff and customers frequently click shared links.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers