SQL Injection Vulnerability in Product Filter for WooCommerce by WBW
CVE-2026-3830

Currently unrated

Key Information:

Vendor

WordPress

Vendor
CVE Published:
13 April 2026

Badges

๐Ÿ‘พ Exploit Exists๐ŸŸก Public PoC

What is CVE-2026-3830?

The Product Filter for WooCommerce plugin by WBW prior to version 3.1.3 has a critical flaw where it fails to properly sanitize and escape user inputs before integrating them into SQL statements. This oversight exposes the application to SQL injection attacks, which can be exploited by unauthenticated users to manipulate the database, potentially gaining unauthorized access to sensitive information or executing arbitrary SQL commands.

Affected Version(s)

Product Filter for WooCommerce by WBW 0 < 3.1.3

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

Timeline

  • ๐ŸŸก

    Public PoC available

  • ๐Ÿ‘พ

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

mcdruid
WPScan
.