High (8.8)

Wordpress RCE (CVE-2026-1750)

CVE-2026-1750

The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the...

Affected: WordPress

Overview

A critical security vulnerability has been identified in the Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress. This flaw allows users with very basic permissions to escalate their privileges to a powerful store manager role, potentially taking full administrative control of the site’s ecommerce functions.

Vulnerability Explained

In simple terms, the plugin contains a function designed to save user profile information. This function is missing a critical security check to verify if a user is allowed to assign administrative store access.

Because of this oversight, any logged-in user, even one with the lowest “subscriber” role, can send a specially crafted request when updating their profile. By adding a specific parameter (ec_store_admin_access), they can grant themselves “store manager” privileges. This bypasses all intended permission controls within the plugin.

Potential Impact

The impact of this vulnerability is severe. A successful exploit would allow an attacker to:

  • Gain unauthorized access to the store’s management dashboard.
  • View, modify, or steal sensitive customer data, including orders and personal information.
  • Tamper with products, inventory, and pricing.
  • Intercept or manipulate financial transactions.
  • Use the compromised store manager account as a foothold for further attacks on the website.

This poses a direct threat to business operations, revenue, and customer privacy, and could lead to significant reputational damage.

Remediation and Mitigation Steps

Immediate action is required to secure affected websites.

  1. Update Immediately: The primary and most critical step is to update the Ecwid by Lightspeed Ecommerce Shopping Cart plugin to version 7.0.8 or higher. The plugin developers have released a patch that adds the proper capability check to fix this flaw.
  2. Verify User Roles: Site administrators should audit their user lists, particularly focusing on accounts with “store manager” or administrator roles. Look for any recently modified or suspicious accounts that may have been created via exploitation.
  3. Apply Principle of Least Privilege: Review and ensure all users, especially subscribers and customers, have only the minimum permissions necessary for their role.
  4. Monitor for Suspicious Activity: Keep an eye on website and server logs for any unusual profile update requests or unexpected administrative actions from low-privilege user accounts.

Note: If you are unable to update the plugin immediately, consider disabling it until the update can be safely applied, bearing in mind this will render the shopping cart non-functional.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other WordPress Vulnerabilities

View all WordPress vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.