Wholesale Suite – B2B, Dynamic Pricing & WooCommerce Wholesale Pric…

Wholesale Suite – B2B, Dynamic Pricing & WooCommerce Wholesale Pric…

by | Feb 25, 2026 | Plugins

Attack Vectors

CVE-2026-27541 is a High-severity privilege escalation issue (CVSS 7.2; CVE record) affecting Wholesale Suite – B2B, Dynamic Pricing & WooCommerce Wholesale Prices (plugin slug: woocommerce-wholesale-prices) in versions up to and including 2.2.1.

The attacker must already be authenticated with Shop Manager-level access or higher. In practical terms, the most likely entry points are compromised Shop Manager credentials (phishing, password reuse, credential stuffing), overly broad internal access (temporary staff, agencies, contractors), or accounts created via weak onboarding/offboarding processes.

Security Weakness

The vulnerability allows an authenticated user with Shop Manager permissions to elevate privileges to Administrator. This is a high-risk control failure because it breaks the intended separation between store operations roles (e.g., managing orders/products) and full site administration (e.g., managing plugins, users, and site configuration).

At the time of writing, there is no known patch available. Per the published guidance, organizations should review the advisory details and apply mitigations aligned to their risk tolerance; for many businesses, the safest path may be to uninstall the affected plugin and replace it to restore least-privilege controls. Source: Wordfence vulnerability advisory.

Technical or Business Impacts

If exploited, an attacker can obtain Administrator access and potentially take actions that materially impact revenue, brand trust, and compliance posture. This can include creating hidden admin accounts for persistence, modifying checkout or pricing rules, installing or altering plugins/themes, redirecting site traffic, injecting malicious code, or accessing sensitive customer and order data depending on what is stored and how the site is configured.

For marketing leaders and executives, the primary business risks are: lost sales from site downtime or checkout disruption, fraud through manipulated pricing or payout settings, data exposure leading to notification and legal costs, and reputational damage from customer-facing defacement or payment-related incidents. With no patch currently available, risk decisions often come down to whether continued use is acceptable versus the operational cost of replacing the affected functionality.

Mitigations to consider immediately: restrict and audit Shop Manager accounts (remove any that are unnecessary), enforce strong unique passwords and MFA where available, review recent admin/user changes for anomalies, tighten access for third parties, and increase monitoring/alerting for new administrator creation and plugin/theme changes. Consider temporarily reducing privileges of non-essential Shop Manager users until the plugin is replaced.

Similar attacks (real examples): privilege escalation and authorization failures in WordPress ecosystems have repeatedly led to administrative takeover risks, including CVE-2023-27372 (BuddyPress), CVE-2021-29447 (WordPress Media library XXE-related issue), and CVE-2020-25213 (WP File Manager).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers