CVE-2026-3589

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to create new admin user accounts on a WooCommerce site without needing to log in, potentially giving them full control over the store. It can be exploited by anyone, as long as they can trick a logged-in admin into executing a malicious request.

Technical Description

The WooCommerce WordPress plugin from versions 5.4.0 to 10.5.2 does not properly handle batch requests, which could allow unauthenticated users to make a logged in admin call non store/WC REST endpoints, and create arbitrary admin users via a CSRF attack for example.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$2,053($1K-$5K)
Vendor Response
Grade APatched in 3 days

Quick Information

Published

Mar 6, 2026

about 1 month ago

Last Modified

Mar 9, 2026

29 days ago