Description
Deserialization of Untrusted Data vulnerability in WebToffee Product Feed for WooCommerce webtoffee-product-feed allows Object Injection.This issue affects Product Feed for WooCommerce: from n/a through <= 2.3.3.
Published: 2026-03-25
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Object Injection
Action: Update now
AI Analysis

Impact

The vulnerability is a deserialization flaw that allows untrusted data to be processed by the WebToffee Product Feed for WooCommerce plugin. This flaw can be used to inject PHP objects with malicious properties, potentially leading to arbitrary code execution and compromising site confidentiality, integrity, and availability. The description does not report a specific exploit, but the nature of object injection is intrinsically dangerous.

Affected Systems

WordPress sites running the WebToffee Product Feed for WooCommerce plugin in versions up to and including 2.3.3 are affected. The issue is present in every installation that has not yet upgraded beyond version 2.3.3, regardless of other WordPress components.

Risk and Exploitability

With a CVSS score of 7.2 the vulnerability is considered high severity. An EPSS score of less than 1% suggests that active exploitation is unlikely at present, and the flaw is not listed in the CISA KEV catalog. The attack vector is inferred to require an attacker to supply crafted serialized data via a plugin input or internal data flow; no publicly documented exploitation has appeared yet.

Generated by OpenCVE AI on March 26, 2026 at 19:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the plugin to version 2.3.4 or later.
  • If an upgrade cannot be performed immediately, disable or delete the WebToffee Product Feed for WooCommerce plugin to remove the vulnerable code path.
  • Continuously monitor the vendor’s security advisories for additional patches or guidance.

Generated by OpenCVE AI on March 26, 2026 at 19:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 26 Mar 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 26 Mar 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Webtoffee
Webtoffee product Feed For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Webtoffee
Webtoffee product Feed For Woocommerce
Wordpress
Wordpress wordpress

Wed, 25 Mar 2026 16:45:00 +0000

Type Values Removed Values Added
Description Deserialization of Untrusted Data vulnerability in WebToffee Product Feed for WooCommerce webtoffee-product-feed allows Object Injection.This issue affects Product Feed for WooCommerce: from n/a through <= 2.3.3.
Title WordPress Product Feed for WooCommerce plugin <= 2.3.3 - PHP Object Injection vulnerability
Weaknesses CWE-502
References

Subscriptions

Webtoffee Product Feed For Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-03-26T15:48:38.148Z

Reserved: 2026-01-07T13:44:16.751Z

Link: CVE-2026-22480

cve-icon Vulnrichment

Updated: 2026-03-26T15:48:32.571Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-25T17:16:30.650

Modified: 2026-03-30T13:27:35.820

Link: CVE-2026-22480

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-27T09:46:56Z

Weaknesses