Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2001: CWE-862 Missing Authorization in wpxpo WowRevenue – Product Bundles & Bulk Discounts

0
High
VulnerabilityCVE-2026-2001cvecve-2026-2001cwe-862
Published: Mon Feb 16 2026 (02/16/2026, 19:24:03 UTC)
Source: CVE Database V5
Vendor/Project: wpxpo
Product: WowRevenue – Product Bundles & Bulk Discounts

Description

CVE-2026-2001 is a high-severity vulnerability in the WowRevenue WordPress plugin that allows authenticated users with subscriber-level access or higher to install arbitrary plugins due to missing authorization checks. Exploitation requires no user interaction and can lead to remote code execution, compromising confidentiality, integrity, and availability of affected sites. The vulnerability affects all versions up to 2. 1. 3 of the plugin. Although no known exploits are currently in the wild, the ease of exploitation and high impact make this a critical risk for WordPress sites using this plugin. European organizations using WowRevenue are at risk, especially those with subscriber-level user registrations. Mitigation involves promptly updating the plugin once a patch is available or restricting subscriber-level permissions and monitoring for unauthorized plugin installations. Countries with high WordPress usage and e-commerce activity, such as Germany, the UK, France, and the Netherlands, are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/16/2026, 19:58:51 UTC

Technical Analysis

CVE-2026-2001 is a vulnerability classified under CWE-862 (Missing Authorization) found in the WowRevenue – Product Bundles & Bulk Discounts plugin for WordPress, affecting all versions up to and including 2.1.3. The flaw exists in the 'Notice::install_activate_plugin' function, where the plugin fails to perform proper capability checks before allowing plugin installation. This missing authorization check enables any authenticated user with subscriber-level access or higher to install arbitrary plugins on the WordPress site. Since WordPress plugins run with the same privileges as the web server user, this can lead to remote code execution (RCE), allowing attackers to execute arbitrary code, escalate privileges, or take full control of the affected server. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with an attack vector of network, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability. No patches or exploit code are currently publicly available, but the vulnerability's nature makes it a critical risk for sites using the plugin. Attackers could leverage this flaw to deploy backdoors, malware, or pivot within the network, severely impacting the security posture of affected organizations.

Potential Impact

For European organizations, the impact of this vulnerability can be significant, especially for those operating e-commerce or content management systems based on WordPress that utilize the WowRevenue plugin. Unauthorized plugin installation can lead to remote code execution, resulting in data breaches, defacement, service disruption, or full system compromise. Confidential customer data, payment information, and intellectual property could be exposed or altered. The attack requires only subscriber-level access, which is often granted to registered users or customers, increasing the attack surface. This vulnerability could also be exploited to establish persistent footholds or launch further attacks within corporate networks. The reputational damage and regulatory consequences under GDPR for data breaches could be severe, especially for organizations in highly regulated sectors such as finance, healthcare, and retail.

Mitigation Recommendations

Immediate mitigation should focus on restricting subscriber-level permissions to prevent unauthorized plugin installation until a patch is released. Administrators should audit user roles and capabilities, removing unnecessary privileges from low-level users. Monitoring for unexpected plugin installations or modifications in the WordPress environment is critical. Implementing Web Application Firewalls (WAF) with rules to detect and block suspicious plugin installation attempts can provide additional protection. Organizations should subscribe to vendor and security advisories to apply patches promptly once available. As a longer-term measure, adopting the principle of least privilege for user roles and regularly reviewing plugin security posture will reduce risk. Backup and incident response plans should be updated to address potential exploitation scenarios related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-02-05T17:25:44.508Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6993739ed1735ca731a8ba4f

Added to database: 2/16/2026, 7:44:30 PM

Last enriched: 2/16/2026, 7:58:51 PM

Last updated: 2/16/2026, 10:22:25 PM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats