Advanced Product Fields (Product Addons) for WooCommerce <= 1.6.18 - Missing Authorization
Description
The Advanced Product Fields (Product Addons) for WooCommerce plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on a function in all versions up to, and including, 1.6.18. This makes it possible for unauthenticated attackers to perform an unauthorized action.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NTechnical Details
<=1.6.18What Changed in the Fix
Changes introduced in v1.6.19
Source Code
WordPress.org SVN# Exploitation Research Plan: CVE-2026-32457 ## 1. Vulnerability Summary The **Advanced Product Fields (Product Addons) for WooCommerce** plugin (<= 1.6.18) contains a missing authorization vulnerability. The `Admin_Controller` registers several AJAX actions intended for administrative product and …
Show full research plan
Exploitation Research Plan: CVE-2026-32457
1. Vulnerability Summary
The Advanced Product Fields (Product Addons) for WooCommerce plugin (<= 1.6.18) contains a missing authorization vulnerability. The Admin_Controller registers several AJAX actions intended for administrative product and term searching. These actions, specifically wapf_search_products, wapf_search_tags, wapf_search_cat, and wapf_search_variations, are registered without sufficient capability checks in the handler functions. Furthermore, if these are registered as nopriv (unauthenticated) to support frontend features like "Child Product" selection, they allow unauthenticated users to query potentially sensitive product data.
The CVSS vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N suggests a Low Integrity impact. This indicates the vulnerability allows an unauthorized action that modifies state, such as duplicating field groups via the maybe_duplicate method if it is triggered without a capability check during an early hook like admin_init.
2. Attack Vector Analysis
- Endpoint:
/wp-admin/admin-ajax.php(AJAX) or/wp-admin/admin-post.php(foradmin_inithooks). - Vulnerable Actions:
wapf_search_products(AJAX)- `wap
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.