Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1750: CWE-269 Improper Privilege Management in ecwid Ecwid by Lightspeed Ecommerce Shopping Cart

0
High
VulnerabilityCVE-2026-1750cvecve-2026-1750cwe-269
Published: Sun Feb 15 2026 (02/15/2026, 03:24:33 UTC)
Source: CVE Database V5
Vendor/Project: ecwid
Product: Ecwid by Lightspeed Ecommerce Shopping Cart

Description

The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the 'save_custom_user_profile_fields' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to supply the 'ec_store_admin_access' parameter during a profile update and gain store manager access to the site.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/22/2026, 22:26:05 UTC

Technical Analysis

CVE-2026-1750 is a vulnerability classified under CWE-269 (Improper Privilege Management) found in the Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress. The vulnerability exists in all versions up to and including 7.0.7 due to a missing capability check in the 'save_custom_user_profile_fields' function. This function is responsible for handling updates to user profiles, but it fails to verify whether the authenticated user has the necessary permissions to modify the 'ec_store_admin_access' parameter. As a result, an attacker with minimal privileges, such as a subscriber, can manipulate this parameter during a profile update request to escalate their privileges to store manager level. This escalation grants them extensive control over the ecommerce store, including access to sensitive data, ability to modify store settings, and potentially disrupt operations. The vulnerability can be exploited remotely over the network without requiring user interaction, making it highly accessible to attackers. The CVSS v3.1 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and the need for only low privileges to exploit. No public exploits have been reported yet, but the vulnerability's nature and impact warrant immediate attention from site administrators. The lack of a patch link indicates that a fix may not yet be publicly available, emphasizing the need for interim mitigations.

Potential Impact

The impact of CVE-2026-1750 is significant for organizations using the Ecwid by Lightspeed Ecommerce Shopping Cart plugin on WordPress. Successful exploitation allows an attacker with minimal privileges to gain store manager access, effectively granting administrative control over the ecommerce platform. This can lead to unauthorized access to sensitive customer data, including personal and payment information, resulting in data breaches and regulatory compliance violations. Attackers could manipulate product listings, pricing, and inventory, causing financial losses and reputational damage. They may also disrupt store operations by altering configurations or deleting critical data, impacting availability and business continuity. Given the widespread use of WordPress and the popularity of Ecwid for ecommerce, the vulnerability poses a global risk, especially to small and medium-sized businesses that may lack robust security controls. The ease of exploitation and high impact on all security pillars (confidentiality, integrity, availability) make this a critical threat that could facilitate further attacks such as fraud, phishing, or malware distribution through compromised stores.

Mitigation Recommendations

To mitigate CVE-2026-1750, organizations should immediately restrict profile update capabilities to trusted roles only, preventing subscribers or low-privilege users from modifying profile fields until a patch is available. Administrators should audit user roles and permissions to ensure no unnecessary privileges are granted. Implement Web Application Firewalls (WAFs) with rules to detect and block attempts to supply the 'ec_store_admin_access' parameter in profile update requests from unauthorized users. Monitor logs for suspicious profile update activities and unusual privilege escalations. If possible, disable or limit the Ecwid plugin functionality temporarily in high-risk environments. Stay informed about vendor updates and apply patches promptly once released. Additionally, enforce multi-factor authentication for administrative accounts and regularly back up ecommerce data to enable recovery from potential compromises. Conduct security awareness training for staff to recognize signs of account misuse and phishing attempts that could facilitate exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-02T06:58:05.355Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699151874b0e3abdf9d7dedb

Added to database: 2/15/2026, 4:54:31 AM

Last enriched: 2/22/2026, 10:26:05 PM

Last updated: 3/31/2026, 7:29:48 PM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses