High (8.1)

WCFM Plugin IDOR (CVE-2026-4896)

CVE-2026-4896

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and inclu...

Overview

A high-severity Insecure Direct Object Reference (IDOR) vulnerability has been identified in the WCFM – Frontend Manager for WooCommerce plugin for WordPress. Tracked as CVE-2026-4896, this flaw affects all plugin versions up to and including 6.7.25.

Vulnerability Details

The vulnerability exists due to missing access control checks on user-supplied object identifiers in multiple AJAX actions and controllers. Specifically, functions like wcfm_modify_order_status, delete_wcfm_article, and delete_wcfm_product fail to verify if the authenticated user has the right to modify the requested resource.

This allows an authenticated attacker with “Vendor” or higher-level access to the WordPress site to manipulate objects they do not own. They can change the status of any WooCommerce order, delete or modify any post, product, or page, regardless of which user created it.

Impact

The primary impact is data integrity and site functionality. A malicious vendor could:

  • Cancel or complete orders they did not process, disrupting business operations.
  • Delete or alter website pages, posts, and product listings, causing content loss and site damage.
  • Potentially escalate privileges by manipulating administrative content.

This could lead to significant operational disruption, loss of customer trust, and financial harm. For more on the consequences of data manipulation, review recent incidents in our breach reports.

Remediation and Mitigation

The plugin developer has released a fix in a version higher than 6.7.25. Site administrators must take immediate action.

  1. Immediate Update: Update the “WCFM – Frontend Manager for WooCommerce” plugin to the latest available version immediately via the WordPress admin dashboard.
  2. Access Review: Audit and minimize the number of user accounts with “Vendor” and higher-level privileges. Ensure the principle of least privilege is followed.
  3. Monitoring: Closely monitor logs for unexpected post deletions, order status changes, or product modifications, especially from vendor accounts.
  4. Backup: Confirm that reliable, recent backups of your site’s files and database are in place before and after applying the update.

Stay informed on other critical WordPress security updates by following our security news.

Security Insight

This IDOR flaw is a classic example of authorization logic being overlooked in AJAX endpoints, a recurring pattern in WordPress plugin security. It highlights how complex plugins that blend frontend and backend functionality can introduce subtle access control gaps, effectively allowing a trusted user role to break tenant isolation-a critical requirement for multi-vendor platforms.

Further Reading

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.