[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fXog3ZFnR6Ai-YxDq8yVuIxAD9RzDQMMLmIgriRdUb-E":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2026-1750","ecwid-by-lightspeed-ecommerce-shopping-cart-authenticated-subscriber-privilege-escalation-via-ecstoreadminaccess","Ecwid by Lightspeed Ecommerce Shopping Cart \u003C= 7.0.7 - Authenticated (Subscriber+) Privilege Escalation via ec_store_admin_access","The Ecwid by Lightspeed Ecommerce Shopping Cart plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 7.0.7. This is due to a missing capability check in the 'save_custom_user_profile_fields' function. This makes it possible for authenticated attackers, with minimal permissions such as a subscriber, to supply the 'ec_store_admin_access' parameter during a profile update and gain store manager access to the site.","ecwid-shopping-cart",null,"\u003C=7.0.7","7.0.8","high",8.8,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:H\u002FI:H\u002FA:H","Improper Privilege Management","2026-02-14 14:30:00","2026-02-15 03:24:33",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F2d29f77c-b86d-4058-b528-27631e8a1f2e?source=api-prod",1]