CVE-2026-27374
Received Received - Intake
Missing Authorization in WooCommerce Order Details Plugin

Publication date: 2026-03-05

Last updated on: 2026-03-06

Assigner: Patchstack

Description
Missing Authorization vulnerability in vanquish WooCommerce Order Details woocommerce-order-details allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WooCommerce Order Details: from n/a through <= 3.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-05
Last Modified
2026-03-06
Generated
2026-05-07
AI Q&A
2026-03-05
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
patchstack woocommerce_order_details to 3.1 (inc)
vanquish woocommerce_order_details to 3.1 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-27374 is a high-priority Broken Access Control vulnerability in the WordPress WooCommerce Order Details Plugin versions up to and including 3.1.

The vulnerability arises from missing authorization, authentication, or nonce token checks within certain functions, which allows unauthenticated users to perform actions that normally require higher privileges.

This means that attackers can exploit incorrectly configured access control security levels to gain unauthorized access or perform unauthorized actions.


How can this vulnerability impact me? :

This vulnerability can have serious impacts because it allows unauthenticated users to bypass access controls and perform privileged actions.

Such unauthorized access can lead to data exposure, manipulation of order details, or other malicious activities within the WooCommerce environment.

Given its CVSS severity score of 7.5, it is considered highly dangerous and likely to be exploited by attackers.

No official patch is currently available, so users must apply mitigation rules to protect their websites.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability arises from missing authorization, authentication, or nonce token checks within certain functions of the WooCommerce Order Details plugin, allowing unauthenticated users to perform privileged actions.

No specific detection commands or network signatures are provided in the available resources.

Users are advised to monitor for unusual or unauthorized access attempts to the WooCommerce Order Details plugin endpoints, especially those that do not require authentication.


What immediate steps should I take to mitigate this vulnerability?

No official patch is currently available for this vulnerability.

Patchstack has issued a mitigation rule that can be applied to block attacks targeting this flaw.

Users are strongly advised to implement this mitigation immediately to protect their websites until an official patch is released.

Continuous security intelligence and automated vulnerability mitigation tools from Patchstack can help safeguard WordPress sites against this threat.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart