Product Table and List Builder for WooCommerce Lite Vulnerability (…

Product Table and List Builder for WooCommerce Lite Vulnerability (…

by | Feb 19, 2026 | Plugins

Attack Vectors

Product Table and List Builder for WooCommerce Lite (slug: wc-product-table-lite) has a High severity vulnerability (CVSS 7.5, CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N) that can be exploited remotely over the internet.

The issue is an unauthenticated time-based SQL injection via the search parameter in versions 4.6.2 and earlier. In practical terms, an attacker does not need a login and can attempt to manipulate database queries by sending crafted requests to your WordPress site wherever the plugin accepts the search input.

Because it is time-based, attackers may test and confirm the weakness by causing the site to respond more slowly in measurable ways, then iterate to extract data from the database over multiple requests.

Security Weakness

This vulnerability (CVE-2026-2232) exists due to insufficient escaping of user-supplied input and a lack of sufficient query preparation in the plugin’s database interaction when handling the search parameter. These are common failure points that allow outside input to be interpreted as part of a database query rather than as plain text.

When a plugin that interacts with WooCommerce product data processes search requests without strong safeguards, it can unintentionally expose the underlying database to unauthorized querying. The reported impact for this vulnerability is primarily on confidentiality, consistent with the CVSS vector indicating high data exposure risk but no direct integrity or availability impact.

Remediation is straightforward: update Product Table and List Builder for WooCommerce Lite to version 4.6.3 or newer, which is the patched release noted by the source.

Technical or Business Impacts

For marketing directors and business owners, the key risk is that attackers may be able to extract sensitive information from the site’s database without logging in. Depending on what your WordPress and WooCommerce database contains, this can translate into exposure of customer-related data, business intelligence (such as product and pricing data), or other stored information that was never meant to be publicly accessible.

Even if no immediate defacement or downtime occurs, a High-severity data exposure event can drive real business consequences: loss of customer trust, increased regulatory and contractual scrutiny, and costly incident response. Compliance and finance teams should also consider downstream impacts like breach notification obligations (depending on jurisdiction and the nature of data stored), and unplanned spend on forensics, legal review, and public communications.

Action for leadership: confirm whether wc-product-table-lite is installed and whether any sites remain on 4.6.2 or earlier, then prioritize updating to 4.6.3+ as part of routine patch management. For reference, see the official CVE entry for CVE-2026-2232 and the source advisory at Wordfence Threat Intelligence.

Similar Attacks

SQL injection is a long-standing and widely exploited attack class, and it has affected major organizations over the years. Examples often cited in security and business risk discussions include the Sony PlayStation Network breach (2011), the ASUS routers/cloud services case referenced by the U.S. FTC, and the Heartland Payment Systems attack (U.S. DOJ press release reference).

While the specific details and root causes differ, the business lesson is consistent: when attackers can query data they should not access, the result is often a costly mix of customer impact, brand damage, and compliance exposure.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers