Cyber Threat Brief — March 22 2026

⚠️ This report is AI-generated. Always validate findings.

Previous brief: Cyber Threat Brief — March 21 2026


Threat count: 1 qualifying threat (1 new CVE with weaponized PoC)

1. Datalogics Ecommerce Delivery WordPress Plugin — CVE-2026-2631

TL;DR: Weaponized exploit script for CVE-2026-2631 (CVSS 9.8) automates full admin takeover of WordPress sites running Datalogics Ecommerce Delivery < 2.6.60 — ~15K active installations exposed to mass exploitation.

What’s New:

  • Weaponized exploit script publicly released March 19–21; confirmed by BrinzTech and OffSeq threat radar
  • Exploit chains unauthenticated REST endpoint (/wp-json/datalogics/) to overwrite datalogics_token, then abuses update_option() to set default_role=administrator and register rogue admin accounts
  • Mass exploitation anticipated across ~15,000+ active installations
  • Post-LeakBase takedown (March 4) distribution pattern suggests sophisticated actors enabling lower-tier attackers

Actionable Intel

ArtifactTypeATT&CKLog SourceAction
POST /wp-json/datalogics/* (sequential token mod → option update → user reg)HTTP patternT1190WAF / web proxyBlock unauthenticated POST; alert on sequence
datalogics_token option modified in wp_optionsDB changeT1098WordPress application logs / WP Activity LogAlert on unauthorized change
users_can_register=1 + default_role=administrator set via REST APIDB changeT1078.001, T1136.001WordPress DB auditAlert on any modification
New Administrator accounts not created by legitimate adminsAccount creationT1136.001wp_users table auditAudit and remove rogue accounts
Datalogics Ecommerce Delivery < 2.6.60Vulnerable softwareAsset inventoryUpdate to 2.6.60+; deactivate if patching delayed

Detection

SourceRuleGap
Splunk ESCUWeb Shell Indicator (partial — post-exploitation only)No rule for REST API privilege escalation via wp_options manipulation
ElasticNoneNo WordPress REST API abuse detection
SigmaWebshell Detection via File Creation (partial)No rule for update_option() abuse or default_role change via REST

Sources: BrinzTech threat intel, OffSeq threat radar, WordPress plugin directory


Status Updates

  • CVE-2026-20131 (Cisco FMC): CISA deadline today — CVSS 10.0 insecure deserialization RCE exploited by Interlock ransomware since Jan 26; treat unpatched systems as critical emergency. Full IOCs → March 19 brief.
  • CVE-2026-21992 (Oracle Identity Manager): Out-of-band patch (CVSS 9.8) for unauthenticated RCE issued March 19–20; no confirmed exploitation yet but predecessor CVE-2025-61757 was exploited in wild Nov 2025 — patch immediately.