Description
The EasyCommerce – AI-Powered, Fast & Beautiful WordPress Ecommerce Plugin plugin for WordPress is vulnerable to Privilege Escalation in versions 0.9.0-beta2 to 1.8.2. This is due to the /easycommerce/v1/orders REST API endpoint not properly restricting the ability for users to select roles during registration. This makes it possible for unauthenticated attackers to gain administrator-level access to a vulnerable site.
Published: 2025-11-11
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability resides in the /easycommerce/v1/orders REST API of the EasyCommerce WordPress plugin. The endpoint fails to enforce role restrictions during user registration, permitting any unauthenticated caller to specify an elevated role. This flaw allows an attacker with no credentials to submit a request that promotes the new user to an administrator, thereby gaining full control of the WordPress site. The flaw is a clear instance of improper authorization (CWE-269) that can compromise confidentiality, integrity, and availability.

Affected Systems

The flaw affects EasyCommerce – AI‑Powered WordPress Ecommerce Plugin versions 0.9.0‑beta2 through 1.8.2. Any site running this plugin within that range is vulnerable, regardless of other configurations. The plugin is distributed via the official WordPress plugin repository and used to sell digital products, subscriptions, and physical goods.

Risk and Exploitability

With an unscoped Privilege Escalation CVSS score of 9.8, the risk is severe. The EPSS score is under 1 %, indicating that current automation targeting this issue is rare, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Nonetheless, the attack vector is straightforward: a remote attacker can issue an unauthenticated REST request to the vulnerable endpoint, supply parameters that assign an administrator role, and immediately gain full administrative access. Because no authentication or privilege checks precede role assignment, exploitation requires minimal technical skill or resources.

Generated by OpenCVE AI on April 22, 2026 at 12:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the EasyCommerce plugin to the latest version (≥1.8.3) that removes the role selection flaw.
  • If an upgrade is not immediately possible, block unauthenticated access to the /easycommerce/v1/orders endpoint using a firewall or plugin settings.
  • Review user registration and role assignment configurations to ensure only authenticated, authorized users can assign privileged roles.
  • Deploy a Web Application Firewall rule that rejects any request attempting to specify an admin role during registration.

Generated by OpenCVE AI on April 22, 2026 at 12:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description The EasyCommerce – AI-Powered, Fast & Beautiful WordPress Ecommerce Plugin plugin for WordPress is vulnerable to Privilege Escalation in versions 0.9.0-beta2 to 1.5.0. This is due to the /easycommerce/v1/orders REST API endpoint not properly restricting the ability for users to select roles during registration. This makes it possible for unauthenticated attackers to gain administrator-level access to a vulnerable site. The EasyCommerce – AI-Powered, Fast & Beautiful WordPress Ecommerce Plugin plugin for WordPress is vulnerable to Privilege Escalation in versions 0.9.0-beta2 to 1.8.2. This is due to the /easycommerce/v1/orders REST API endpoint not properly restricting the ability for users to select roles during registration. This makes it possible for unauthenticated attackers to gain administrator-level access to a vulnerable site.
Title EasyCommerce – AI-Powered, Blazing-Fast & Beautiful WordPress Ecommerce Plugin 0.9.0-beta2 - 1.5.0 - Unauthenticated Privilege Escalation EasyCommerce – AI-Powered, Blazing-Fast & Beautiful WordPress Ecommerce Plugin 0.9.0-beta2 - 1.8.2 - Unauthenticated Privilege Escalation
References

Fri, 14 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Easycommerce
Easycommerce ai-powered Wordpress Ecommerce Plugin
Wordpress
Wordpress wordpress
Vendors & Products Easycommerce
Easycommerce ai-powered Wordpress Ecommerce Plugin
Wordpress
Wordpress wordpress

Tue, 11 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The EasyCommerce – AI-Powered, Fast & Beautiful WordPress Ecommerce Plugin plugin for WordPress is vulnerable to Privilege Escalation in versions 0.9.0-beta2 to 1.5.0. This is due to the /easycommerce/v1/orders REST API endpoint not properly restricting the ability for users to select roles during registration. This makes it possible for unauthenticated attackers to gain administrator-level access to a vulnerable site.
Title EasyCommerce – AI-Powered, Blazing-Fast & Beautiful WordPress Ecommerce Plugin 0.9.0-beta2 - 1.5.0 - Unauthenticated Privilege Escalation
Weaknesses CWE-269
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Easycommerce Ai-powered Wordpress Ecommerce Plugin
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:03:15.415Z

Reserved: 2025-10-07T18:32:16.049Z

Link: CVE-2025-11457

cve-icon Vulnrichment

Updated: 2025-11-14T15:25:24.460Z

cve-icon NVD

Status : Deferred

Published: 2025-11-11T04:15:41.627

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11457

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T12:30:16Z

Weaknesses