Exploit for CVE-2026-2631

The Datalogics Ecommerce Delivery WordPress plugin before 2.6.60 exposes an unauthenticated REST endpoint that allows any remote user to modify the option `datalogics_token` without verification. This token is subsequently used for authentication in a protected endpoint that allows users to perform arbitrary WordPress `update_option()` operations. Attackers can use this to enable registartion and to set the default role as Administrator.

Published: 2026-03-11

CVSS: 9.8

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Download Exploit for CVE-2026-2631 here:

Use Tor Browser to access .onion site.

https://sonitex.com/exploit-576-cve-2026-28479/

https://sonitex.com/exploit-321-cve-2026-3289/

https://sonitex.com/exploit-216-cve-2026-3134/

https://sonitex.com/exploit-655-cve-2026-3747/

https://sonitex.com/exploit-62-cve-2026-2038/