StoreCustomizer – A plugin to Customize all WooCommerce Pages Vulne…

StoreCustomizer – A plugin to Customize all WooCommerce Pages Vulne…

by | Mar 19, 2026 | Plugins

Attack Vectors

CVE-2026-27046 is a Medium-severity authorization issue affecting StoreCustomizer – A plugin to Customize all WooCommerce Pages (slug: woocustomizer) in versions <= 2.6.3. The vulnerability can be exploited remotely over the network (CVSS 4.3; CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N), but it requires an authenticated WordPress account (subscriber-level access or higher).

From a business-risk perspective, this matters most on sites where user accounts are easy to obtain (e.g., public customer registration, loyalty programs, partner portals, job applications, or any workflow that creates WordPress users automatically). Any authenticated user in scope could potentially attempt the unauthorized action without needing an administrator login.

Security Weakness

The root cause is a missing capability (authorization) check on a plugin function in StoreCustomizer versions up to and including 2.6.3. In practical terms, this means the plugin does not reliably verify that the logged-in user is allowed to perform a specific action before executing it.

Wordfence reports that this missing authorization makes it possible for authenticated attackers, including subscriber-level users, to perform an unauthorized action. The public summary does not specify the exact action, so risk owners should assume the affected action could involve site configuration or WooCommerce presentation changes until proven otherwise.

Reference: CVE-2026-27046 record and Wordfence vulnerability advisory.

Technical or Business Impacts

While the severity is rated Medium and the CVSS indicates limited integrity impact, missing authorization issues can still create meaningful business exposure—especially for revenue-generating WooCommerce sites where page layouts and purchase flows directly influence conversion rates and brand trust.

Potential business impacts include:

Conversion and revenue risk: Unauthorized changes to WooCommerce page presentation could disrupt add-to-cart flows, checkout clarity, promotions, pricing presentation, or other storefront elements that marketing teams rely on for predictable performance.

Brand and customer trust risk: Unexpected storefront behavior, broken layouts, or altered messaging can erode trust, increase cart abandonment, and drive support tickets—particularly during campaigns or seasonal peaks.

Compliance and audit concerns: If unauthorized users can change site behavior without proper approval controls, it can conflict with internal change-management requirements and complicate incident response and audit trails.

Operational disruption: Even small integrity changes can trigger time-consuming troubleshooting across Marketing, eCommerce, and IT teams, delaying launches and consuming budget.

Remediation status: There is no known patch available at this time. For many organizations, the most risk-appropriate option is to uninstall StoreCustomizer and replace it with a maintained alternative. If removal is not immediately possible, consider mitigations such as restricting who can register accounts, reviewing all existing low-privilege users, reducing or disabling subscriber access where feasible, and increasing monitoring for unexpected WooCommerce/page customization changes.

Similar Attacks

Missing authorization and privilege-related issues in WordPress plugins are a common path attackers use to gain influence over site behavior without needing an administrator password. One well-known example is CVE-2018-19207 (WP GDPR Compliance), where insufficient permission checks contributed to privilege escalation scenarios.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers