CVE-2026-1128
CSRF Vulnerability in WP eCommerce Plugin Allows Admin Coupon Deletion
Publication date: 2026-03-06
Last updated on: 2026-03-06
Assigner: WPScan
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wp_ecommerce | wp_ecommerce | to 3.15.1 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-352 | The web application does not, or cannot, sufficiently verify whether a request was intentionally provided by the user who sent the request, which could have originated from an unauthorized actor. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
[{'type': 'paragraph', 'content': 'CVE-2026-1128 is a Cross-Site Request Forgery (CSRF) vulnerability in the WP eCommerce WordPress plugin versions up to and including 3.15.1.'}, {'type': 'paragraph', 'content': 'The plugin does not have proper CSRF protection when deleting coupons, which means an attacker can trick a logged-in administrator into unintentionally deleting coupons by having them visit a specially crafted URL.'}, {'type': 'paragraph', 'content': "Because there is no CSRF check, the coupons get deleted without the admin's explicit consent."}, {'type': 'paragraph', 'content': 'This vulnerability is classified under CWE-352 (Cross-Site Request Forgery) and is related to OWASP Top 10 category A2: Broken Authentication and Session Management.'}] [1]
How can this vulnerability impact me? :
[{'type': 'paragraph', 'content': 'This vulnerability can impact you by allowing an attacker to delete coupons from your WP eCommerce store without your knowledge or consent.'}, {'type': 'paragraph', 'content': 'If an administrator is tricked into visiting a malicious URL, coupons could be removed, potentially causing financial loss or disruption in promotional campaigns.'}, {'type': 'paragraph', 'content': "Since the attacker exploits the admin's authenticated session, this could lead to unauthorized changes in your eCommerce system."}] [1]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
I don't know
How can this vulnerability be detected on my network or system? Can you suggest some commands?
[{'type': 'paragraph', 'content': 'This vulnerability can be detected by checking if your WP eCommerce WordPress plugin version is up to and including 3.15.1, as these versions lack CSRF protection when deleting coupons.'}, {'type': 'paragraph', 'content': 'One way to detect exploitation attempts is to monitor HTTP requests to URLs similar to the following pattern, which are used to delete coupons without proper CSRF checks:'}, {'type': 'list_item', 'content': 'https://example.com/wp-admin/edit.php?post_type=wpsc-product&page=wpsc-edit-coupons&action=delete&coupon%5B0%5D=4&coupon%5B1%5D=5'}, {'type': 'paragraph', 'content': "You can use network monitoring tools or web server logs to search for requests containing the 'action=delete' parameter along with 'coupon' identifiers in the query string."}, {'type': 'paragraph', 'content': 'For example, on a Linux server, you might use commands like:'}, {'type': 'list_item', 'content': "grep 'action=delete' /var/log/apache2/access.log | grep 'coupon'"}, {'type': 'list_item', 'content': "tcpdump -A -s 0 'tcp port 80 and (((ip[2:2] - ((ip[0]&0xf)<<2)) - ((tcp[12]&0xf0)>>2)) != 0)' | grep 'action=delete'"}, {'type': 'paragraph', 'content': 'These commands help identify suspicious requests that may be attempting to exploit the CSRF vulnerability by deleting coupons.'}] [1]
What immediate steps should I take to mitigate this vulnerability?
Since no fix is currently available for this vulnerability, immediate mitigation steps include:
- Restrict access to the WordPress admin area to trusted IP addresses to reduce the risk of attackers tricking logged-in admins.
- Educate administrators to avoid clicking on suspicious links or visiting untrusted websites while logged into the WordPress admin panel.
- Implement web application firewall (WAF) rules to detect and block requests attempting to delete coupons via the vulnerable URL pattern.
- Regularly back up your WordPress database and coupon data to enable recovery in case of unauthorized deletions.
Monitoring and logging suspicious activity related to coupon deletion URLs can also help in early detection and response.