Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 09 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Automattic
Automattic woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Automattic
Automattic woocommerce Wordpress Wordpress wordpress |
Fri, 06 Mar 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-352 | |
| Metrics |
cvssV3_1
|
Fri, 06 Mar 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WooCommerce WordPress plugin from versions 5.4.0 to 10.5.2 does not properly handle batch requests, which could allow unauthenticated users to make a logged in admin call non store/WC REST endpoints, and create arbitrary admin users via a CSRF attack for example. | |
| Title | WooCommerce < 10.5.3 - Arbitrary Admin User Creation via CSRF | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-03-06T17:44:58.613Z
Reserved: 2026-03-05T10:41:21.729Z
Link: CVE-2026-3589
Updated: 2026-03-06T17:44:24.175Z
Status : Deferred
Published: 2026-03-06T10:16:22.497
Modified: 2026-04-15T14:42:29.303
Link: CVE-2026-3589
No data.
OpenCVE Enrichment
Updated: 2026-04-17T12:30:06Z