CVE-2026-3499 PUBLISHED

Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce 13.4.6 - 13.5.2.1 - Cross-Site Request Forgery to Multiple Administrative Actions

Assigner: Wordfence
Reserved: 03.03.2026 Published: 08.04.2026 Updated: 08.04.2026

The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 13.4.6 through 13.5.2.1. This is due to missing or incorrect nonce validation on the ajax_migrate_to_custom_post_type, ajax_adt_clear_custom_attributes_product_meta_keys, ajax_update_file_url_to_lower_case, ajax_use_legacy_filters_and_rules, and ajax_fix_duplicate_feed functions. This makes it possible for unauthenticated attackers to trigger feed migration, clear custom-attribute transient caches, rewrite feed file URLs to lowercase, toggle legacy filter and rule settings, and delete duplicated feed posts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CVSS Score: 8.8

Product Status

Vendor jkohlbach
Product Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce
Versions Default: unaffected
  • affected from 13.4.6 to 13.5.2.1 (incl.)

Credits

  • lucky_buddy finder

References

Problem Types

  • CWE-352 Cross-Site Request Forgery (CSRF) CWE