CVE-2025-11269
Product Filter by WBW <= 3.0.0 - Missing Authorization to Unauthenticated Settings Update
CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th
The Product Filter by WBW plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'approveNotice' action in all versions up to, and including, 3.0.0. This makes it possible for unauthenticated attackers to update the plugin's settings.
| CWE | CWE-862 |
| Vendor | woobewoo |
| Product | product filter for woocommerce by wbw |
| Published | Oct 25, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for woobewoo product filter for woocommerce by wbw
Be the first to know when new medium vulnerabilities affecting woobewoo product filter for woocommerce by wbw are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
woobewoo / Product Filter for WooCommerce by WBW
0 โค 3.0.0
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/03b1d518-0e5d-4c28-af04-52611ad583a8?source=cve github.com: https://github.com/wpcodefactory/woo-product-filter/commit/313f69908cadc31fa9c1e098ff989dc4f75dfdb5 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3382669%40woo-product-filter&new=3382669%40woo-product-filter&sfp_email=&sfph_mail=
Credits
Lucas Montes