CVE-2026-3589
High
|7.5Exploit Available
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to create new admin user accounts on a WooCommerce site without needing to log in, potentially giving them full control over the store. It can be exploited by anyone, as long as they can trick a logged-in admin into executing a malicious request.
Technical Description
The WooCommerce WordPress plugin from versions 5.4.0 to 10.5.2 does not properly handle batch requests, which could allow unauthenticated users to make a logged in admin call non store/WC REST endpoints, and create arbitrary admin users via a CSRF attack for example.
CVSS Vector Analysis
Attack VectorNetwork
Attack ComplexityHigh
Privileges RequiredNone
User InteractionRequired
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged
Vector String
CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Est. Bounty
$2,053($1K-$5K)
Vendor Response
Grade APatched in 3 days
Quick Information
Published
Mar 6, 2026
about 1 month ago
Last Modified
Mar 9, 2026
29 days ago