Advanced AJAX Product Filters Vulnerability (High) – CVE-2026-1426

Advanced AJAX Product Filters Vulnerability (High) – CVE-2026-1426

by | Feb 18, 2026 | Plugins

Attack Vectors

The WordPress plugin Advanced AJAX Product Filters (slug: woocommerce-ajax-filters) is affected by a High severity vulnerability (CVSS 8.8) tracked as CVE-2026-1426. The issue impacts all versions up to and including 3.1.9.6 and can be triggered by an authenticated user with Author-level access or higher.

The risk path is tied to how the plugin’s Live Composer compatibility layer handles certain inputs: an attacker who can access affected functionality may be able to feed data that the plugin does not safely validate before processing. In practical business terms, this means the attack is most relevant in organizations where multiple users (internal teams, agencies, contractors, or partners) have publishing rights.

Security Weakness

The underlying weakness is PHP Object Injection caused by unsafe handling of data in the plugin’s shortcode_check function within the Live Composer compatibility layer. This type of weakness occurs when a plugin processes user-supplied data in a way that can allow crafted objects to be introduced into the application’s runtime.

Important constraint: according to the published details, there is no known POP chain in the vulnerable software itself. That means the vulnerability’s real-world impact depends on whether your site also has another plugin or theme installed that contains a usable POP chain. In other words, this issue can become significantly more dangerous in a “mixed plugin” environment—common in marketing stacks with multiple add-ons.

Technical or Business Impacts

If a usable POP chain exists elsewhere in your WordPress environment, this vulnerability can create a pathway to severe outcomes consistent with its High rating and CVSS scoring, including loss of confidentiality, integrity, and availability. For leadership teams, the practical exposure is that a user who already has publishing permissions could potentially escalate impact well beyond content changes.

From a business-risk perspective, the consequences can include site downtime during peak campaigns, loss of customer trust, incident response costs, and potential compliance and reporting obligations depending on what data your WordPress instance touches (customer records, analytics identifiers, or integrations). Because the trigger requires an authenticated Author+ account, the risk also intersects with third-party access governance (agencies, freelancers) and credential hygiene.

Remediation: update Advanced AJAX Product Filters to 3.1.9.7 or newer patched versions. Reference: Wordfence advisory.

Similar Attacks

Unsafe deserialization and object injection weaknesses have been used historically in real-world compromises, often becoming critical when combined with other components in the environment. Examples include: CVE-2019-8942 (WordPress core issue involving PHP object injection conditions) and OWASP guidance on deserialization risks, which documents how these flaws are commonly exploited when supporting gadget chains exist.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers