Wordpress RCE (CVE-2026-1750)
CVE-2026-1750
The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the...
Overview
A critical security vulnerability has been identified in the Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress. This flaw allows users with very basic permissions to escalate their privileges to a powerful store manager role, potentially taking full administrative control of the site’s ecommerce functions.
Vulnerability Explained
In simple terms, the plugin contains a function designed to save user profile information. This function is missing a critical security check to verify if a user is allowed to assign administrative store access.
Because of this oversight, any logged-in user, even one with the lowest “subscriber” role, can send a specially crafted request when updating their profile. By adding a specific parameter (ec_store_admin_access), they can grant themselves “store manager” privileges. This bypasses all intended permission controls within the plugin.
Potential Impact
The impact of this vulnerability is severe. A successful exploit would allow an attacker to:
- Gain unauthorized access to the store’s management dashboard.
- View, modify, or steal sensitive customer data, including orders and personal information.
- Tamper with products, inventory, and pricing.
- Intercept or manipulate financial transactions.
- Use the compromised store manager account as a foothold for further attacks on the website.
This poses a direct threat to business operations, revenue, and customer privacy, and could lead to significant reputational damage.
Remediation and Mitigation Steps
Immediate action is required to secure affected websites.
- Update Immediately: The primary and most critical step is to update the Ecwid by Lightspeed Ecommerce Shopping Cart plugin to version 7.0.8 or higher. The plugin developers have released a patch that adds the proper capability check to fix this flaw.
- Verify User Roles: Site administrators should audit their user lists, particularly focusing on accounts with “store manager” or administrator roles. Look for any recently modified or suspicious accounts that may have been created via exploitation.
- Apply Principle of Least Privilege: Review and ensure all users, especially subscribers and customers, have only the minimum permissions necessary for their role.
- Monitor for Suspicious Activity: Keep an eye on website and server logs for any unusual profile update requests or unexpected administrative actions from low-privilege user accounts.
Note: If you are unable to update the plugin immediately, consider disabling it until the update can be safely applied, bearing in mind this will render the shopping cart non-functional.
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
The Listee theme for WordPress is vulnerable to privilege escalation in all versions up to, and including, 1.1.6. This is due to a broken validation check in the bundled listee-core plugin's user regi...
The Clasifico Listing plugin for WordPress is vulnerable to privilege escalation in versions up to, and including, 2.0. This is due to the plugin allowing users who are registering new accounts to set...
The Lizza LMS Pro plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.0.3. This is due to the 'lizza_lms_pro_register_user_front_end' function not restri...
The Buyent Classified plugin for WordPress (bundled with Buyent theme) is vulnerable to privilege escalation via user registration in all versions up to, and including, 1.0.7. This is due to the plugi...
Other WordPress Vulnerabilities
The Pix for WooCommerce plugin for WordPress is vulnerable to arbitrary file uploads due to missing capability check and missing file type validation in the 'lkn_pix_for_woocommerce_c6_save_settings' ...
The Database for Contact Form 7, WPforms, Elementor forms plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.4.7 via deserialization of untrusted input ...
The Tutor LMS – eLearning and online course solution plugin for WordPress is vulnerable to SQL Injection via the 'coupon_code' parameter in all versions up to, and including, 3.9.6 due to insufficient...
The WP Mail Logging plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 1.15.0 via deserialization of untrusted input from the email log message field. Thi...