Description
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via the 'wcfm_delete_wcfm_customer' due to missing validation on the 'customerid' user controlled key. This makes it possible for authenticated attackers, with Vendor-level access and above, to delete arbitrary users, including Administrators.
Published: 2026-05-02
Score: 8.1 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The WCFM – Frontend Manager for WooCommerce plugin contains an insecure direct object reference that allows an authenticated user with Vendor‑level permissions or higher to delete any user account by providing an arbitrary customer ID. The missing validation on the 'wcfm_delete_wcfm_customer' endpoint means that malicious actors can remove administrators or other critical users, leading to loss of access, service disruption, and potential escalation of privileges if the deleted accounts were used for further operations.

Affected Systems

WordPress sites that have the WCFM – Frontend Manager for WooCommerce plugin from vendor wclovers installed in any version up to and including 6.7.25 are affected. The vulnerability exists in the core of the plugin that handles customer management for Store Owners, Vendors, and Administrators.

Risk and Exploitability

The CVSS score of 8.1 highlights a high severity impact and the vulnerability requires the attacker to be authenticated with Vendor‑level or higher privileges; it cannot be exploited unauthenticated. Though no current EPSS value is available, the lack of a publicly listed exploit does not reduce the risk, as the vulnerability allows the deletion of critical accounts. The identified weakness is CWE‑639, indicating insufficient authorization checks on user deletion. Attackers can craft a request to the vulnerable endpoint with any customer ID to remove that user, which could compromise site administration or lead to broader compromise if the user holds elevated roles.

Generated by OpenCVE AI on May 2, 2026 at 14:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the WCFM – Frontend Manager for WooCommerce plugin to the latest version that addresses the ID validation issue (>= 6.7.26).
  • Revoke Vendor‑level access from users who do not require it, or audit the list of users granted vendor privileges to ensure only trusted accounts retain that role.
  • Add a server‑side check that confirms the supplied customer ID belongs to the requester’s scope or that the requester has explicit permission to delete that user before performing the deletion.

Generated by OpenCVE AI on May 2, 2026 at 14:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Wclovers
Wclovers wcfm – Frontend Manager For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Wclovers
Wclovers wcfm – Frontend Manager For Woocommerce
Wordpress
Wordpress wordpress

Sat, 02 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via the 'wcfm_delete_wcfm_customer' due to missing validation on the 'customerid' user controlled key. This makes it possible for authenticated attackers, with Vendor-level access and above, to delete arbitrary users, including Administrators.
Title WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible <= 6.7.25 - Authenticated (Vendor+) Insecure Direct Object Reference to Arbitrary User Deletion
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H'}


Subscriptions

Wclovers Wcfm – Frontend Manager For Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-02T13:26:09.653Z

Reserved: 2026-02-15T17:16:55.850Z

Link: CVE-2026-2554

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T14:16:17.707

Modified: 2026-05-02T14:16:17.707

Link: CVE-2026-2554

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T15:15:25Z

Weaknesses