Mega Store Woocommerce Vulnerability (Medium) – CVE-2025-14357

Mega Store Woocommerce Vulnerability (Medium) – CVE-2025-14357

by | Feb 18, 2026 | Themes

Attack Vectors

The Mega Store Woocommerce WordPress theme (slug: mega-store-woocommerce) has a Medium severity issue (CVSS 5.3) that can be abused by an attacker who already has a logged-in account on your site. This includes low-privilege roles such as Subscriber and above.

If your site allows self-registration, uses lead-capture flows that create accounts automatically, or has many third-party users (agencies, partners, contractors), the likelihood of an attacker obtaining or taking over a basic account increases. From there, they may be able to create pages and change certain site settings without proper authorization.

Security Weakness

CVE-2025-14357 describes a missing authorization (capability) check in the theme’s setup_widgets() function located at core/includes/importer/whizzie.php, affecting all versions up to and including 5.9. In practical terms, the theme may not consistently confirm that a logged-in user is allowed to perform sensitive actions before those actions are processed.

According to the published advisory, this weakness can allow authenticated users (Subscriber+) to create arbitrary pages and modify site settings—actions that should normally be restricted to trusted administrative roles.

Reference: CVE-2025-14357 record and the reported source advisory from Wordfence.

Technical or Business Impacts

While the severity is rated Medium, the business risk can be significant because unauthorized pages and settings changes can directly affect customer trust and revenue-generating funnels. Attackers may publish pages that impersonate your brand, alter on-site messaging, or disrupt marketing campaigns by changing key site behaviors.

Potential impacts include: brand damage from unauthorized or misleading content, compliance concerns if site settings changes affect privacy notices or consent workflows, operational disruption from emergency response and cleanup, and measurable revenue loss from reduced conversion rates, broken checkout paths, or campaign downtime.

Remediation note: There is no known patch available at this time. Based on your organization’s risk tolerance, it may be best to uninstall the affected theme and replace it. If removal is not immediately possible, consider mitigations such as disabling public user registration where feasible, tightening who can obtain Subscriber accounts, reviewing existing user accounts and roles, and increasing monitoring for unexpected page creation or settings changes.

Similar Attacks

Authorization and access-control gaps are a recurring cause of real-world website compromise because they let attackers make changes that look “legitimate” in logs (they are performed by a real account). Here are a few well-documented examples of CMS-related vulnerabilities that enabled unauthorized content or site changes:

CVE-2017-5487 (WordPress REST API content injection)
CVE-2018-7600 (Drupal “Drupalgeddon2”)
CVE-2020-25213 (WordPress File Manager plugin)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers