CVE-2026-1426
📋 TL;DR
The Advanced AJAX Product Filters WordPress plugin is vulnerable to PHP object injection via deserialization of untrusted input in the Live Composer compatibility layer. This allows authenticated attackers with Author-level access or higher to inject PHP objects, but exploitation requires both the Live Composer plugin to be active and another plugin/theme containing a POP chain to be installed. Without a POP chain present, the vulnerability has no direct impact.
💻 Affected Systems
- Advanced AJAX Product Filters for WordPress
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
If a POP chain is present via another plugin/theme, attackers could delete arbitrary files, retrieve sensitive data, or execute arbitrary code on the server.
Likely Case
Limited impact due to requirement for both Live Composer plugin and specific POP chain in another component; most sites will not have exploitable conditions.
If Mitigated
No impact if proper access controls prevent Author-level account compromise and no POP chain components are installed.
🎯 Exploit Status
Exploitation requires multiple conditions: Author-level access, Live Composer plugin active, and presence of POP chain in another component
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Versions after 3.1.9.6
Vendor Advisory: https://plugins.trac.wordpress.org/changeset/3449344/
Restart Required: No
Instructions:
1. Update Advanced AJAX Product Filters plugin to latest version via WordPress admin panel. 2. Verify version is greater than 3.1.9.6. 3. No server restart required.
🔧 Temporary Workarounds
Disable Live Composer Compatibility
allRemove or disable the Live Composer compatibility layer if not using Live Composer plugin
Remove file: wp-content/plugins/woocommerce-ajax-filters/includes/compatibility/live_composer.php
Restrict Author Access
allImplement strict access controls and monitoring for Author-level accounts
🧯 If You Can't Patch
- Remove the Advanced AJAX Product Filters plugin entirely if not essential
- Implement web application firewall rules to block suspicious deserialization attempts
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin panel > Plugins > Advanced AJAX Product Filters version. If version is 3.1.9.6 or lower, you are vulnerable.
Check Version:
wp plugin list --name='Advanced AJAX Product Filters' --field=version
Verify Fix Applied:
Verify plugin version is greater than 3.1.9.6 in WordPress admin panel.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to WordPress admin-ajax.php with serialized data
- Author-level accounts performing unexpected plugin actions
- Errors related to deserialization in PHP error logs
Network Indicators:
- HTTP requests containing serialized PHP objects in parameters
- Unusual traffic patterns from Author-level user accounts
SIEM Query:
source="wordpress.log" AND ("unserialize" OR "live_composer" OR "shortcode_check")
🔗 References
- https://cwe.mitre.org/data/definitions/502.html
- https://plugins.trac.wordpress.org/browser/woocommerce-ajax-filters/trunk/includes/compatibility/live_composer.php#L25
- https://plugins.trac.wordpress.org/browser/woocommerce-ajax-filters/trunk/includes/compatibility/live_composer.php#L28
- https://plugins.trac.wordpress.org/browser/woocommerce-ajax-filters/trunk/includes/compatibility/live_composer.php#L33
- https://plugins.trac.wordpress.org/changeset/3449344/#file418
- https://www.wordfence.com/threat-intel/vulnerabilities/id/29e76d57-217f-4f21-8bc6-a86290783a19?source=cve