LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-3499 - Vulnerability Analysis

HighCVSS: 8.8

Last Updated: April 8, 2026

Product Feed PRO for WooCommerce - Cross-Site Request Forgery

Published: April 8, 2026Updated: April 8, 2026Remote Exploitable

Overview

Product Feed PRO for WooCommerce by AdTribes 13.4.6 through 13.5.2.1 contains a cross-site request forgery caused by missing or incorrect nonce validation in multiple ajax functions, letting unauthenticated attackers trigger administrative actions via forged requests, exploit requires site administrator interaction.

Severity & Score

Severity: High
CVSS Score: 8.8
EPSS Score: 1.7%(Probability of exploitation in next 30 days)

Impact

Unauthenticated attackers can perform administrative actions like feed migration and cache clearing by tricking site administrators, potentially disrupting site functionality.

Mitigation

Update to a version later than 13.5.2.1 or the latest available version.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Apr 8, 2026

🟠 CVE-2026-3499 - High (8.8) The Product Feed PRO for WooCommerce by AdTribes – Product Feeds for WooCommerce plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 13.4.6 through 13.5.2.1. This is due to missing or incorrect nonce validation on the aj... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-3499/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-3499
Severity
High
CVSS Score
8.8
Type
cross_site_request_forgery
Status
unconfirmed
EPSS
1.7%
Social Posts
1

CWE

  • CWE-352

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

EPSS Score

1.7%Probability of exploitation in the next 30 days