CVE-2026-3460 Overview
The REST API TO MiniProgram plugin for WordPress contains an Insecure Direct Object Reference (IDOR) vulnerability in all versions up to, and including, 5.1.2. This security flaw arises from a fundamental mismatch between the permission validation and the actual operation performed by the REST API endpoint. Specifically, the permission callback (update_user_wechatshop_info_permissions_check) only validates that the supplied openid parameter corresponds to an existing WordPress user, while the callback function (update_user_wechatshop_info) uses a separate, attacker-controlled userid parameter to determine which user's metadata gets modified.
Critical Impact
Authenticated attackers with Subscriber-level access can modify arbitrary users' store-related metadata (storeinfo, storeappid, storename) via the userid REST API parameter, potentially impacting e-commerce operations and user data integrity.
Affected Products
- REST API TO MiniProgram plugin for WordPress versions up to and including 5.1.2
- WordPress installations using the vulnerable plugin versions
- WeChat MiniProgram integrations utilizing the affected REST API endpoints
Discovery Timeline
- March 21, 2026 - CVE-2026-3460 published to NVD
- March 23, 2026 - Last updated in NVD database
Technical Details for CVE-2026-3460
Vulnerability Analysis
This vulnerability represents a classic Insecure Direct Object Reference pattern where authorization checks are performed against one parameter while the actual data modification uses a different, attacker-controlled parameter. The flaw exists in the ram-rest-weixin-controller.php file, which handles WeChat-related REST API endpoints for the MiniProgram integration.
The core issue lies in the disconnect between the permission validation logic and the actual business logic execution. When a request is made to update user store information, the permission callback verifies that the openid parameter corresponds to a valid WordPress user. However, this check provides no protection because the subsequent callback function operates on an entirely different parameter—userid—which the attacker can set to any value, including user IDs belonging to other accounts.
This design flaw allows authenticated users with minimal privileges (Subscriber-level) to tamper with store metadata belonging to other users, including administrators and store owners.
Root Cause
The root cause is a failure to implement proper authorization binding between the authenticated user's identity and the target resource being modified. The update_user_wechatshop_info_permissions_check function validates the wrong parameter, creating a security gap where the openid and userid parameters are never verified to belong to the same user account. This violates the principle of least privilege and proper access control implementation.
Attack Vector
The attack exploits the network-accessible REST API endpoint. An authenticated attacker with Subscriber-level access can craft malicious API requests that include their own valid openid to pass the permission check, while specifying a different victim's userid to target arbitrary user accounts. The attacker can then modify store-related metadata fields including storeinfo, storeappid, and storename for any user on the WordPress installation.
The attack requires no user interaction and can be performed remotely with low complexity. The attacker manipulates the REST API parameters to bypass the flawed authorization check and modify data belonging to other users.
Detection Methods for CVE-2026-3460
Indicators of Compromise
- Unusual REST API calls to WeChat store metadata endpoints with mismatched openid and userid parameters
- Unexpected modifications to user store metadata (storeinfo, storeappid, storename) without corresponding user activity
- API requests from low-privilege accounts (Subscribers) attempting to modify other users' data
- Log entries showing REST API calls to /wp-json/ endpoints related to MiniProgram with suspicious parameter combinations
Detection Strategies
- Monitor WordPress REST API access logs for requests to MiniProgram-related endpoints with parameter anomalies
- Implement Web Application Firewall (WAF) rules to flag REST API requests where openid and userid parameters reference different user accounts
- Deploy SentinelOne Singularity to detect and alert on suspicious API manipulation patterns targeting WordPress installations
- Review WordPress audit logs for unexpected user metadata changes, particularly store-related fields
Monitoring Recommendations
- Enable comprehensive logging for all REST API endpoints related to the MiniProgram plugin
- Configure alerts for metadata modifications performed by users other than the account owner
- Implement real-time monitoring of WordPress user metadata tables for unauthorized changes
- Utilize SentinelOne's behavioral AI to identify anomalous patterns in API request sequences
How to Mitigate CVE-2026-3460
Immediate Actions Required
- Update the REST API TO MiniProgram plugin to a version newer than 5.1.2 that addresses this vulnerability
- Audit user store metadata for unauthorized modifications that may have occurred prior to patching
- Review WordPress REST API access logs to identify potential exploitation attempts
- Consider temporarily disabling the affected plugin if an update is not immediately available
Patch Information
Organizations should update the REST API TO MiniProgram plugin to the latest available version that includes the security fix for this IDOR vulnerability. Technical details about the vulnerable code locations can be found in the WordPress Plugin Trac repository. Additional vulnerability details are available in the Wordfence Vulnerability Report.
Workarounds
- Restrict access to the vulnerable REST API endpoints at the web server level using IP allowlisting or authentication requirements
- Implement custom WordPress code to validate that openid and userid parameters belong to the same user before processing requests
- Disable user registration to prevent attackers from easily obtaining Subscriber-level access
- Deploy a Web Application Firewall (WAF) rule to block REST API requests with mismatched identity parameters
# Apache .htaccess workaround to restrict access to vulnerable endpoint
<IfModule mod_rewrite.c>
RewriteEngine On
RewriteCond %{REQUEST_URI} ^/wp-json/.*miniprogram.* [NC]
RewriteCond %{REMOTE_ADDR} !^192\.168\.1\.
RewriteRule ^ - [F,L]
</IfModule>
Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.


