Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 12 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Datalogics Ecommerce Delivery
Datalogics Ecommerce Delivery datalogics Ecommerce Delivery Wordpress Wordpress wordpress |
|
| Vendors & Products |
Datalogics Ecommerce Delivery
Datalogics Ecommerce Delivery datalogics Ecommerce Delivery Wordpress Wordpress wordpress |
Wed, 11 Mar 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-269 | |
| Metrics |
cvssV3_1
|
Wed, 11 Mar 2026 06:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication in a protected endpoint that allows users to perform arbitrary WordPress `update_option()` operations. Attackers can use this to enable registartion and to set the default role as Administrator. | |
| Title | Datalogics Ecommerce Delivery < 2.6.60 - Unauthenticated Privilege Escalation | |
| References |
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-03-11T13:26:10.077Z
Reserved: 2026-02-17T15:27:51.784Z
Link: CVE-2026-2631
Updated: 2026-03-11T13:24:13.338Z
Status : Deferred
Published: 2026-03-11T06:17:14.467
Modified: 2026-04-15T15:05:47.827
Link: CVE-2026-2631
No data.
OpenCVE Enrichment
Updated: 2026-03-20T14:37:44Z