CVE-2026-39477
Missing Authorization in CartFlows β€ 2.2.3 Enables Unauthorized Access
Publication date: 2026-04-08
Last updated on: 2026-04-29
Assigner: Patchstack
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| brainstorm_force | cartflows | to 2.2.3 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2026-39477 is a broken access control vulnerability in the WordPress CartFlows plugin versions up to and including 2.2.3.
This issue arises from missing authorization, authentication, or nonce token checks within certain plugin functions, allowing unprivileged users (such as contributors or developers) to perform actions that require higher privileges.
It is classified under the OWASP Top 10 category A1: Broken Access Control.
How can this vulnerability impact me? :
This vulnerability allows unprivileged users to perform actions that should require higher privileges, potentially leading to unauthorized changes or access within the affected WordPress site.
Although the CVSS severity score is 4.3, indicating a low severity impact, the vulnerability can be exploited in mass campaigns targeting many websites indiscriminately.
It does not pose a significant threat specifically to high-traffic or popular sites but should be addressed promptly to prevent exploitation.
Users are strongly advised to update to version 2.2.4 or later to mitigate the risk.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability is related to missing authorization checks in the WordPress CartFlows plugin versions up to 2.2.3. Detection typically involves verifying the plugin version installed on your WordPress site.
You can check the installed version of the CartFlows plugin by running commands on your server or using WordPress CLI tools.
- Using WP-CLI: wp plugin list | grep cartflows
- Manually check the plugin version in the WordPress admin dashboard under Plugins.
There are no specific network detection commands or signatures provided for this vulnerability in the available resources.
What immediate steps should I take to mitigate this vulnerability?
The primary mitigation step is to update the CartFlows plugin to version 2.2.4 or later, where the vulnerability has been patched.
Additionally, enabling auto-updates for the plugin can provide rapid protection against this and similar vulnerabilities.
Since the vulnerability involves broken access control, reviewing and tightening user roles and permissions in WordPress can also help reduce risk.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any direct impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.