UpsellWP – WooCommerce Upsell and Related Products Offers Vulnerabi…

UpsellWP – WooCommerce Upsell and Related Products Offers Vulnerabi…

by | Mar 19, 2026 | Plugins

Attack Vectors

CVE-2026-32459 is a medium-severity SQL Injection vulnerability (CVSS 4.9) affecting the UpsellWP – WooCommerce Upsell and Related Products Offers plugin (slug: checkout-upsell-and-order-bumps) in versions 2.2.4 and below.

The issue is not a public, anonymous attack: an attacker must already have authenticated access with Shop Manager-level permissions or higher. In practice, this risk most often shows up when credentials are stolen (phishing, password reuse), when too many people have elevated roles, or when a third-party agency/contractor account is compromised.

Once an attacker has the required access, they can abuse a vulnerable plugin request parameter to manipulate database queries and potentially retrieve sensitive information stored in WordPress/WooCommerce.

Security Weakness

According to the published advisory, UpsellWP versions up to 2.2.4 are vulnerable due to insufficient escaping of a user-supplied parameter and a lack of sufficient preparation in an existing SQL query. This can allow an authenticated attacker (Shop Manager+) to append SQL in a way that may expose data from the site’s database.

From a governance perspective, this is a reminder that “authenticated-only” vulnerabilities still matter: marketing and commerce plugins often touch order, customer, and promotional data, and privileged roles are frequently shared across operations teams.

Remediation: update UpsellWP – WooCommerce Upsell and Related Products Offers to version 2.2.5 or newer (patched). Reference: Wordfence advisory. CVE record: CVE-2026-32459.

Technical or Business Impacts

The CVSS vector (including C:H) indicates the primary risk is confidentiality: an attacker with Shop Manager+ access may be able to extract sensitive information from the database. Depending on what’s stored in your WordPress/WooCommerce environment, this could include customer contact details, order history, operational notes, or other business data.

For business leaders, the practical impacts can include privacy and compliance exposure (investigations, notifications, contractual reporting), reputational damage (loss of customer trust), and commercial disruption (pausing campaigns or checkout changes while the incident is contained). Even when payment data is handled by a processor, customer and order data leakage can still trigger significant regulatory and brand consequences.

Similar attacks: SQL injection has been used in major breaches such as the 2015 TalkTalk data breach and the Heartland Payment Systems breach. While every incident differs, these examples show how database-query weaknesses can escalate into large-scale data exposure and costly response efforts.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers