Description
The Product Pricing Table by WooBeWoo plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.0. This is due to missing or incorrect nonce validation on the updateLabel() and remove() functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages or delete pricing tables via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Published: 2026-04-15
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross‑site scripting and deletion of pricing tables via CSRF
Action: Immediate Patch
AI Analysis

Impact

The Product Pricing Table by WooBeWoo plugin for WordPress is vulnerable to Cross‑Site Request Forgery due to missing or incorrect nonce validation on the updateLabel() and remove() functions. An attacker who can entice a site administrator into visiting a crafted link can inject arbitrary scripts into the site’s pages or delete pricing tables. The injected scripts execute with the privileges of the logged‑in administrator, potentially exposing sensitive data or compromising site functionality.

Affected Systems

All versions of the Product Pricing Table by WooBeWoo plugin up to and including 1.1.0, which are installed on WordPress sites.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.1, indicating moderate severity. Exploit probability data is unavailable and the vulnerability is not listed in CISA’s Known Exploited Vulnerabilities catalog. The likely attack vector is through social engineering; an attacker sends a forged request to an administrator who mistakenly triggers the vulnerable action, thereby achieving the stored XSS and pricing table deletion outcomes.

Generated by OpenCVE AI on April 15, 2026 at 13:22 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Product Pricing Table by WooBeWoo plugin to version 1.1.1 or later, which includes correct nonce validation for updateLabel() and remove() functions.
  • If an immediate upgrade is not possible, remove or comment out the updateLabel() and remove() functions from the plugin’s code to eliminate the CSRF entry points until a proper patch can be applied.
  • Apply the WordPress best practice of restricting plugin setting access to administrators only, and consider enabling two‑factor authentication for admin accounts to reduce the likelihood of accidental CSRF clicks.

Generated by OpenCVE AI on April 15, 2026 at 13:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Woobeewoo
Woobeewoo product Pricing Table By Woobewoo
Wordpress
Wordpress wordpress
Vendors & Products Woobeewoo
Woobeewoo product Pricing Table By Woobewoo
Wordpress
Wordpress wordpress

Wed, 15 Apr 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 11:45:00 +0000

Type Values Removed Values Added
Description The Product Pricing Table by WooBeWoo plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.0. This is due to missing or incorrect nonce validation on the updateLabel() and remove() functions. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages or delete pricing tables via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
Title Product Pricing Table by WooBeWoo <= 1.1.0 - Cross-Site Request Forgery to Stored XSS and Pricing Table Deletion
Weaknesses CWE-352
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

Woobeewoo Product Pricing Table By Woobewoo
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-15T13:05:00.238Z

Reserved: 2026-02-03T18:31:35.145Z

Link: CVE-2026-1852

cve-icon Vulnrichment

Updated: 2026-04-15T13:04:57.234Z

cve-icon NVD

Status : Received

Published: 2026-04-15T12:16:38.613

Modified: 2026-04-15T12:16:38.613

Link: CVE-2026-1852

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:52:55Z

Weaknesses