Description
The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication in a protected endpoint that allows users to perform arbitrary WordPress `update_option()` operations. Attackers can use this to enable registartion and to set the default role as Administrator.
Published: 2026-03-11
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Privilege Escalation
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is caused by an unauthenticated REST endpoint in the Datalogics Ecommerce Delivery plugin that allows any remote user to modify the critical option datalogics_token without verification. This token is later used for authentication in a protected endpoint that allows arbitrary WordPress update_option() operations. An attacker can therefore enable user registration, set the default role to Administrator, and gain unrestricted administrative privileges. The consequence is full privilege escalation, enabling the attacker to modify site settings, user roles, install plugins or themes, and potentially compromise the entire WordPress installation.

Affected Systems

All WordPress installations that use the Datalogics Ecommerce Delivery plugin with a version earlier than 2.6.60 are affected. The plugin is identified as Unknown:Datalogics Ecommerce Delivery.

Risk and Exploitability

The CVSS score is 9.8, indicating critical severity. EPSS is below 1%, implying that current exploit prevalence is low, but the vulnerability is still highly dangerous. It is not listed in the CISA KEV catalog. Exploitation only requires unauthenticated access to the website’s REST API; attackers can send arbitrary requests to set datalogics_token and then invoke the protected option update endpoint, resulting in privilege escalation.

Generated by OpenCVE AI on March 17, 2026 at 15:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of the Datalogics Ecommerce Delivery plugin (2.6.60 or newer).
  • If an upgrade is not possible, disable the plugin or remove the unauthenticated REST endpoint.
  • Restrict REST API access to the plugin’s endpoints using firewall or authentication rules as a temporary workaround.
  • Review and audit WordPress user accounts and options for unauthorized changes, especially new Administrator accounts.

Generated by OpenCVE AI on March 17, 2026 at 15:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 12 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Datalogics Ecommerce Delivery
Datalogics Ecommerce Delivery datalogics Ecommerce Delivery
Wordpress
Wordpress wordpress
Vendors & Products Datalogics Ecommerce Delivery
Datalogics Ecommerce Delivery datalogics Ecommerce Delivery
Wordpress
Wordpress wordpress

Wed, 11 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-269
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 11 Mar 2026 06:15:00 +0000

Type Values Removed Values Added
Description The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication in a protected endpoint that allows users to perform arbitrary WordPress `update_option()` operations. Attackers can use this to enable registartion and to set the default role as Administrator.
Title Datalogics Ecommerce Delivery < 2.6.60 - Unauthenticated Privilege Escalation
References

Subscriptions

Datalogics Ecommerce Delivery Datalogics Ecommerce Delivery
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-03-11T13:26:10.077Z

Reserved: 2026-02-17T15:27:51.784Z

Link: CVE-2026-2631

cve-icon Vulnrichment

Updated: 2026-03-11T13:24:13.338Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-11T06:17:14.467

Modified: 2026-03-11T14:16:27.390

Link: CVE-2026-2631

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-20T14:37:44Z

Weaknesses