Wholesale Lead Capture Plugin for WooCommerce Vulnerability (Critic…

Wholesale Lead Capture Plugin for WooCommerce Vulnerability (Critic…

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2026-27542 is a Critical vulnerability (CVSS 9.8, vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) impacting the Wholesale Lead Capture Plugin for WooCommerce (WordPress plugin slug: woocommerce-wholesale-lead-capture) in versions <= 1.17.8.

The exposure is especially high because the attack can be performed remotely over the internet and does not require a user to be logged in. In practical terms, any site with the vulnerable plugin active may be reachable by opportunistic scanning and automated exploitation attempts.

Security Weakness

The core issue is an unauthenticated privilege escalation condition. According to the published advisory, this weakness can allow an attacker to elevate privileges to administrator without valid credentials when running affected versions of the plugin (up to and including 1.17.8).

This type of weakness is high-risk for business websites because it bypasses normal access controls and can hand over full administrative control of the WordPress environment (users, content, plugins, settings) to an external party.

Technical or Business Impacts

Full site takeover risk: Administrator-level access can enable attackers to modify site content, create new admin users, change payment or shipping settings, add malicious plugins, or redirect traffic. For WooCommerce-driven revenue, this can translate into immediate financial loss and prolonged operational disruption.

Brand and customer trust damage: An attacker with admin access can deface pages, inject unwanted content, or push users to fraudulent destinations. This can harm campaign performance, SEO, and brand reputation, and may trigger customer-support and PR escalation.

Compliance and reporting exposure: If the attacker uses admin access to access or exfiltrate data stored in WordPress/WooCommerce (for example, customer details), you may face contractual obligations, regulatory reporting requirements, or audit findings depending on your industry and geography.

Remediation status and risk decision: There is no known patch available at this time. Based on your organization’s risk tolerance, it may be prudent to uninstall the affected software and replace it. If immediate removal is not feasible, consider compensating controls such as restricting admin access (IP allow-list/VPN), enforcing MFA for all admin users, increasing logging/alerting for new administrator creation and role changes, and placing the site behind a WAF—while recognizing these steps may reduce risk but do not eliminate the underlying exposure.

Similar attacks (real examples): Unauthenticated privilege escalation in WordPress plugins has been used in the past to achieve rapid site takeovers, including CVE-2023-3460 (Ultimate Member) and CVE-2018-19207 (WP GDPR Compliance).

Reference: Wordfence advisory for this issue: Wholesale Lead Capture Plugin for WooCommerce <= 1.17.8 – Unauthenticated Privilege Escalation. Official CVE record: CVE-2026-27542.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers