Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0974: CWE-862 Missing Authorization in orderable Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin

0
High
VulnerabilityCVE-2026-0974cvecve-2026-0974cwe-862
Published: Thu Feb 19 2026 (02/19/2026, 04:36:21 UTC)
Source: CVE Database V5
Vendor/Project: orderable
Product: Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin

Description

The Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin plugin for WordPress is vulnerable to unauthorized plugin installation due to a missing capability check on the 'install_plugin' function in all versions up to, and including, 1.20.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install arbitrary plugins, which can lead to Remote Code Execution.

AI-Powered Analysis

AILast updated: 02/19/2026, 05:10:43 UTC

Technical Analysis

CVE-2026-0974 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Orderable – WordPress Restaurant Online Ordering System and Food Ordering Plugin. The vulnerability stems from the absence of a capability check in the 'install_plugin' function, which is responsible for installing plugins within the WordPress environment. This missing authorization allows any authenticated user with at least Subscriber-level privileges to bypass normal restrictions and install arbitrary plugins. Since WordPress plugins can execute PHP code, this unauthorized plugin installation can lead to remote code execution (RCE), allowing attackers to execute arbitrary commands on the server hosting the WordPress site. The vulnerability affects all versions up to and including 1.20.0 of the plugin. The CVSS 3.1 base score is 8.8, indicating a high severity with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H, meaning the attack can be performed remotely over the network with low attack complexity, requires low privileges (authenticated user), no user interaction, and impacts confidentiality, integrity, and availability severely. No patches or fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability is particularly dangerous because Subscriber-level access is commonly granted to registered users, which may be easier for attackers to obtain or compromise compared to administrator accounts. This vulnerability can be leveraged to gain full control over the WordPress site, steal sensitive data, deface websites, or use the compromised server as a pivot point for further attacks.

Potential Impact

For European organizations, especially those in the hospitality and food delivery sectors relying on the Orderable plugin, this vulnerability poses a significant risk. Exploitation can lead to full site compromise, data breaches involving customer information, disruption of online ordering services, and potential reputational damage. The ability for low-privilege users to escalate privileges and execute arbitrary code can also facilitate the deployment of malware, ransomware, or use the compromised infrastructure for further attacks such as phishing or cryptomining. Given the widespread adoption of WordPress across Europe and the growing reliance on online food ordering systems, the impact could be extensive, affecting both small businesses and large restaurant chains. Additionally, GDPR compliance risks arise if customer data confidentiality is breached. The disruption of availability could lead to loss of revenue and customer trust, particularly in competitive markets.

Mitigation Recommendations

Organizations should immediately audit user roles and permissions within their WordPress installations to ensure that Subscriber-level users do not have unintended elevated privileges. Until an official patch is released, consider disabling or restricting access to the Orderable plugin's plugin installation functionality via custom code or security plugins that enforce capability checks. Monitoring for unusual plugin installations or changes in the WordPress environment is critical. Employ Web Application Firewalls (WAFs) with rules to detect and block attempts to exploit this vulnerability. Regularly update WordPress core, themes, and plugins, and subscribe to vendor advisories for timely patch releases. Implement multi-factor authentication (MFA) to reduce the risk of account compromise. Conduct penetration testing focusing on privilege escalation vectors. Finally, maintain offline backups of website data and configurations to enable rapid recovery in case of compromise.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-15T01:29:25.748Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699697f56aea4a407a3be0e9

Added to database: 2/19/2026, 4:56:21 AM

Last enriched: 2/19/2026, 5:10:43 AM

Last updated: 2/21/2026, 12:18:21 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats