WCFM Plugin IDOR (CVE-2026-4896)
CVE-2026-4896
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and inclu...
Overview
A high-severity Insecure Direct Object Reference (IDOR) vulnerability has been identified in the WCFM – Frontend Manager for WooCommerce plugin for WordPress. Tracked as CVE-2026-4896, this flaw affects all plugin versions up to and including 6.7.25.
Vulnerability Details
The vulnerability exists due to missing access control checks on user-supplied object identifiers in multiple AJAX actions and controllers. Specifically, functions like wcfm_modify_order_status, delete_wcfm_article, and delete_wcfm_product fail to verify if the authenticated user has the right to modify the requested resource.
This allows an authenticated attacker with “Vendor” or higher-level access to the WordPress site to manipulate objects they do not own. They can change the status of any WooCommerce order, delete or modify any post, product, or page, regardless of which user created it.
Impact
The primary impact is data integrity and site functionality. A malicious vendor could:
- Cancel or complete orders they did not process, disrupting business operations.
- Delete or alter website pages, posts, and product listings, causing content loss and site damage.
- Potentially escalate privileges by manipulating administrative content.
This could lead to significant operational disruption, loss of customer trust, and financial harm. For more on the consequences of data manipulation, review recent incidents in our breach reports.
Remediation and Mitigation
The plugin developer has released a fix in a version higher than 6.7.25. Site administrators must take immediate action.
- Immediate Update: Update the “WCFM – Frontend Manager for WooCommerce” plugin to the latest available version immediately via the WordPress admin dashboard.
- Access Review: Audit and minimize the number of user accounts with “Vendor” and higher-level privileges. Ensure the principle of least privilege is followed.
- Monitoring: Closely monitor logs for unexpected post deletions, order status changes, or product modifications, especially from vendor accounts.
- Backup: Confirm that reliable, recent backups of your site’s files and database are in place before and after applying the update.
Stay informed on other critical WordPress security updates by following our security news.
Security Insight
This IDOR flaw is a classic example of authorization logic being overlooked in AJAX endpoints, a recurring pattern in WordPress plugin security. It highlights how complex plugins that blend frontend and backend functionality can introduce subtle access control gaps, effectively allowing a trusted user role to break tenant isolation-a critical requirement for multi-vendor platforms.
Further Reading
Never miss a critical vulnerability
Get real-time security alerts delivered to your preferred platform.
Related Advisories
WWBN AVideo is an open source video platform. Prior to version 26.0, the `setPassword.json.php` endpoint in the CustomizeUser plugin allows administrators to set a channel password for any user. Due t...
SAPIDO RB-1732 V2.0.43 contains a remote command execution vulnerability that allows unauthenticated attackers to execute arbitrary system commands by submitting malicious input to the formSysCmd endp...
OpenClaw versions prior to 2026.2.14 contain a webhook routing vulnerability in the Google Chat monitor component that allows cross-account policy context misrouting when multiple webhook targets shar...
Note Mark is an open-source note-taking application. In versions 0.19.1 and prior, the asset delivery handler serves uploaded files inline and relies on magic-byte detection for content type, which do...