ilGhera Carta Docente for WooCommerce Vulnerability (Medium) – CVE-…

ilGhera Carta Docente for WooCommerce Vulnerability (Medium) – CVE-…

by | Mar 19, 2026 | Plugins

Attack Vectors

CVE-2026-2421 is a Medium-severity vulnerability (CVSS 6.5) affecting the ilGhera Carta Docente for WooCommerce WordPress plugin (wc-carta-docente) in versions 1.5.0 and earlier.

The issue can be exploited by an authenticated user with Administrator-level access (or higher) by sending a crafted request to the plugin’s wccd-delete-certificate AJAX action and manipulating the cert parameter. In practical terms, this means the attack is most relevant when an admin account is compromised (phishing, password reuse, malware on an admin laptop) or when too many users have elevated access.

Official CVE record: https://www.cve.org/CVERecord?id=CVE-2026-2421

Security Weakness

This vulnerability is a path traversal weakness caused by insufficient file path validation before the plugin deletes a file. Because the plugin does not adequately restrict what file path can be referenced, an attacker with admin privileges can potentially point the deletion routine at files outside the intended directory.

Wordfence notes that this can allow deletion of sensitive files such as wp-config.php, which is a high-risk scenario because it can destabilize the site and potentially open the door to broader compromise.

Source advisory: https://www.wordfence.com/threat-intel/vulnerabilities/id/7aab1307-7fb5-46fb-ae12-087dce3086fc

Technical or Business Impacts

While the required privilege level is high (Administrator+), the business risk is significant because admin accounts are prime targets. If exploited, the attacker can delete arbitrary files on the server, which can lead to:

Operational disruption and downtime: Deleting critical WordPress or server files can take the website offline, interrupting lead generation, ecommerce revenue, and campaign landing pages.

Costly incident response: Restoring a broken site often requires emergency developer time, hosting support, and potentially a full rebuild from clean backups—plus time spent validating that no additional backdoors were introduced.

Escalation to broader compromise: Deleting key configuration files (for example, wp-config.php) can create conditions where site takeover and remote code execution may become possible, increasing the likelihood of data exposure, SEO spam, payment fraud, and reputational damage.

Compliance and reporting pressure: If an outage or compromise affects customer data flows, you may face contractual obligations, regulator notifications, or audit findings—especially relevant to Compliance, CFO, and executive leadership.

Remediation: Update ilGhera Carta Docente for WooCommerce to version 1.5.1 or a newer patched version.

Similar Attacks

Path traversal vulnerabilities are a recurring theme across web platforms, often enabling unauthorized access or destructive actions when input validation is weak. A few notable, real-world examples include:

CVE-2021-41773 (Apache HTTP Server Path Traversal) — widely publicized because it could allow attackers to access files outside the intended web directory under certain configurations.

CVE-2019-19781 (Citrix ADC Directory Traversal) — a high-profile case where traversal played a central role in large-scale exploitation and follow-on compromise.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers