<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>WooCommerce — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/woocommerce/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 15 May 2026 07:16:52 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/woocommerce/feed.xml" rel="self" type="application/rss+xml"/><item><title>CVE-2026-4094: FOX – Currency Switcher Professional for WooCommerce Plugin Vulnerability</title><link>https://feed.craftedsignal.io/briefs/2026-05-cve-2026-4094-wordpress-plugin-vuln/</link><pubDate>Fri, 15 May 2026 07:16:52 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-cve-2026-4094-wordpress-plugin-vuln/</guid><description>The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress is vulnerable to unauthorized data loss (CVE-2026-4094) due to a missing capability check, allowing authenticated attackers with Contributor-level access or higher to delete the multi-currency configuration.</description><content:encoded><![CDATA[<p>The FOX – Currency Switcher Professional for WooCommerce plugin for WordPress, versions up to and including 1.4.5, contains an unauthorized data loss vulnerability tracked as CVE-2026-4094. This flaw stems from a missing capability check within the &lsquo;admin_head&rsquo; function. Successful exploitation allows authenticated attackers with Contributor-level access and above to trigger the deletion of the entire multi-currency configuration. This is achieved by visiting any wp-admin page with the <code>woocs_reset</code> parameter appended. Furthermore, the absence of nonce verification makes the vulnerability exploitable via Cross-Site Request Forgery (CSRF) against administrators. Subscriber-level users can also exploit the vulnerability if the WordPress site is configured to permit Subscriber access to &lsquo;wp-admin&rsquo; pages. This vulnerability poses a risk to websites utilizing the affected plugin, potentially leading to data loss and disruption of e-commerce operations.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker identifies a WordPress website using a vulnerable version (&lt;= 1.4.5) of the FOX – Currency Switcher Professional for WooCommerce plugin.</li>
<li>The attacker authenticates to the WordPress site with Contributor-level or higher privileges.</li>
<li>Alternatively, the attacker identifies an administrator user and prepares a CSRF attack.</li>
<li>The attacker crafts a malicious URL including the <code>woocs_reset</code> parameter.</li>
<li>The attacker sends the crafted URL to the administrator (CSRF) or directly accesses it through the authenticated session.</li>
<li>The <code>admin_head</code> function executes without proper capability checks.</li>
<li>The multi-currency configuration data is deleted.</li>
<li>The website&rsquo;s multi-currency functionality is disrupted, potentially impacting sales and user experience.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-4094 leads to the deletion of the multi-currency configuration within the FOX – Currency Switcher Professional for WooCommerce plugin. This results in a loss of website functionality related to currency switching, potentially causing financial losses and negatively impacting the user experience. The number of affected sites is dependent on the adoption rate of the vulnerable plugin.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade the FOX – Currency Switcher Professional for WooCommerce plugin to the latest available version to patch CVE-2026-4094.</li>
<li>Apply the Sigma rule &ldquo;Detect WordPress FOX - Currency Switcher Plugin Reset via woocs_reset Parameter&rdquo; to identify potential exploitation attempts.</li>
<li>Monitor web server logs for requests containing the <code>woocs_reset</code> parameter within the URL to detect potential unauthorized configuration resets.</li>
<li>Implement and enforce strong CSRF protection measures on all administrative WordPress pages.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>wordpress</category><category>woocommerce</category><category>plugin</category><category>csrf</category><category>data-loss</category><category>cve-2026-4094</category></item></channel></rss>