CVE-2026-0974: CWE-862 Missing Authorization in orderable Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin
The Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the 'install_plugin' function in all versions up to, and including, 1.20.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install arbitrary plugins, which can lead to Remote Code Execution.
AI Analysis
Technical Summary
CVE-2026-0974 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin. The vulnerability stems from the absence of a capability check in the 'install_plugin' function, which is responsible for installing plugins within the WordPress environment. This missing authorization allows any authenticated user with at least Subscriber-level privileges to bypass normal restrictions and install arbitrary plugins. Since WordPress plugins can execute PHP code, this unauthorized plugin installation can lead to remote code execution (RCE), allowing attackers to execute arbitrary commands on the server hosting the WordPress site. The vulnerability affects all versions up to and including 1.20.0 of the plugin. The CVSS 3.1 base score is 8.8, indicating a high severity with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack can be performed remotely over the network with low attack complexity, requires low privileges (authenticated user), no user interaction, and impacts confidentiality, integrity, and availability severely. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability is particularly dangerous because Subscriber-level access is commonly granted to registered users, which may be easier for attackers to obtain or compromise compared to administrator accounts. This vulnerability can be leveraged to gain full control over the WordPress site, steal sensitive data, deface websites, or use the compromised server as a pivot point for further attacks.
Potential Impact
For European organizations, especially those in the hospitality and food delivery sectors relying on the Orderable plugin, this vulnerability poses a significant risk. Exploitation can lead to full site compromise, data breaches involving customer information, disruption of online ordering services, and potential reputational damage. The ability for low-privilege users to escalate privileges and execute arbitrary code can also facilitate the deployment of malware, ransomware, or use the compromised infrastructure for further attacks such as phishing or cryptomining. Given the widespread adoption of WordPress across Europe and the growing reliance on online food ordering systems, the impact could be extensive, affecting both small businesses and large restaurant chains. Additionally, GDPR compliance risks arise if customer data confidentiality is breached. The disruption of availability could lead to loss of revenue and customer trust, particularly in competitive markets.
Mitigation Recommendations
Organizations should immediately audit user roles and permissions within their WordPress installations to ensure that Subscriber-level users do not have unintended elevated privileges. Until an official patch is released, consider disabling or restricting access to the Orderable plugin's plugin installation functionality via custom code or security plugins that enforce capability checks. Monitoring for unusual plugin installations or changes in the WordPress environment is critical. Employ Web Application Firewalls (WAFs) with rules to detect and block attempts to exploit this vulnerability. Regularly update WordPress core, themes, and plugins, and subscribe to vendor advisories for timely patch releases. Implement multi-factor authentication (MFA) to reduce the risk of account compromise. Conduct penetration testing focusing on privilege escalation vectors. Finally, maintain offline backups of website data and configurations to enable rapid recovery in case of compromise.
Affected Countries
United Kingdom, Germany, France, Italy, Spain, Netherlands, Belgium, Sweden
CVE-2026-0974: CWE-862 Missing Authorization in orderable Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin
Description
The Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the 'install_plugin' function in all versions up to, and including, 1.20.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install arbitrary plugins, which can lead to Remote Code Execution.
AI-Powered Analysis
Technical Analysis
CVE-2026-0974 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin. The vulnerability stems from the absence of a capability check in the 'install_plugin' function, which is responsible for installing plugins within the WordPress environment. This missing authorization allows any authenticated user with at least Subscriber-level privileges to bypass normal restrictions and install arbitrary plugins. Since WordPress plugins can execute PHP code, this unauthorized plugin installation can lead to remote code execution (RCE), allowing attackers to execute arbitrary commands on the server hosting the WordPress site. The vulnerability affects all versions up to and including 1.20.0 of the plugin. The CVSS 3.1 base score is 8.8, indicating a high severity with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack can be performed remotely over the network with low attack complexity, requires low privileges (authenticated user), no user interaction, and impacts confidentiality, integrity, and availability severely. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability is particularly dangerous because Subscriber-level access is commonly granted to registered users, which may be easier for attackers to obtain or compromise compared to administrator accounts. This vulnerability can be leveraged to gain full control over the WordPress site, steal sensitive data, deface websites, or use the compromised server as a pivot point for further attacks.
Potential Impact
For European organizations, especially those in the hospitality and food delivery sectors relying on the Orderable plugin, this vulnerability poses a significant risk. Exploitation can lead to full site compromise, data breaches involving customer information, disruption of online ordering services, and potential reputational damage. The ability for low-privilege users to escalate privileges and execute arbitrary code can also facilitate the deployment of malware, ransomware, or use the compromised infrastructure for further attacks such as phishing or cryptomining. Given the widespread adoption of WordPress across Europe and the growing reliance on online food ordering systems, the impact could be extensive, affecting both small businesses and large restaurant chains. Additionally, GDPR compliance risks arise if customer data confidentiality is breached. The disruption of availability could lead to loss of revenue and customer trust, particularly in competitive markets.
Mitigation Recommendations
Organizations should immediately audit user roles and permissions within their WordPress installations to ensure that Subscriber-level users do not have unintended elevated privileges. Until an official patch is released, consider disabling or restricting access to the Orderable plugin's plugin installation functionality via custom code or security plugins that enforce capability checks. Monitoring for unusual plugin installations or changes in the WordPress environment is critical. Employ Web Application Firewalls (WAFs) with rules to detect and block attempts to exploit this vulnerability. Regularly update WordPress core, themes, and plugins, and subscribe to vendor advisories for timely patch releases. Implement multi-factor authentication (MFA) to reduce the risk of account compromise. Conduct penetration testing focusing on privilege escalation vectors. Finally, maintain offline backups of website data and configurations to enable rapid recovery in case of compromise.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-15T01:29:25.748Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699697f56aea4a407a3be0e9
Added to database: 2/19/2026, 4:56:21 AM
Last enriched: 2/19/2026, 5:10:43 AM
Last updated: 2/21/2026, 12:18:21 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.