WooCommerce License Manager Vulnerability (High) – CVE-2026-28114

WooCommerce License Manager Vulnerability (High) – CVE-2026-28114

by | Mar 5, 2026 | Plugins

Attack Vectors

CVE-2026-28114 affects the WooCommerce License Manager WordPress plugin (slug: fs-license-manager) and is rated High severity (CVSS 7.2; CVE link). The issue is an authenticated arbitrary file upload, meaning an attacker must first have valid access.

The documented access level is Shop Manager (or higher). In practical business terms, that includes insider threats, compromised employee accounts, shared credentials, or third-party vendors/agencies that have elevated WooCommerce roles for routine operations.

Security Weakness

The core weakness is missing file type validation in WooCommerce License Manager versions 7.0.6 and below. Without proper validation, the plugin may allow authenticated users at Shop Manager+ to upload files that should never be accepted by a website.

This kind of control failure increases the likelihood that an uploaded file could be used to run unintended actions on the server, and the advisory notes it may make remote code execution possible. That elevates the risk beyond simple defacement and into potential full-site compromise.

Technical or Business Impacts

If exploited, the impacts can be severe: attackers may be able to place arbitrary files on the server and potentially gain a foothold to take broader control of the website. For organizations running revenue-generating WooCommerce stores, this creates direct exposure to downtime, lost sales, and brand damage from visible disruptions or customer-impacting incidents.

From a leadership and compliance perspective (CEO/COO/CFO/Compliance), the most material risks include potential data exposure (customer or order-related information depending on what else is accessible), operational interruption, and incident response costs. Even though the attacker needs Shop Manager+ access, credential compromise is common, and third-party access patterns can widen the practical attack surface.

Remediation: Update WooCommerce License Manager to version 7.0.7 or a newer patched version, per the published guidance (source).

Similar Attacks

Arbitrary file upload weaknesses in web applications and CMS plugins have repeatedly been used to escalate from “limited access” to full site compromise. Examples of widely reported file-upload-driven incidents and patterns include the long-running OWASP guidance on Unrestricted File Upload, which documents how these flaws can lead to server-side code execution and data exposure.

For real-world context on how plugin-related weaknesses can translate into business disruption, high-profile third-party software vulnerabilities have also been used to deploy web shells and malicious code at scale, such as the CISA advisory on Microsoft Exchange exploitation (web shell deployment) and broad campaigns tracked by defenders like CISA’s Known Exploited Vulnerabilities (KEV) Catalog, which often includes web application flaws abused for initial access and persistence.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers