CVE-2025-13930
Awaiting Analysis Awaiting Analysis - Queue
Authorization Bypass in WooCommerce Checkout Manager Allows Attachment Deletion

Publication date: 2026-02-19

Last updated on: 2026-02-19

Assigner: Wordfence

Description
The Checkout Field Manager (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 7.8.5. This is due to the plugin not properly verifying that a user is authorized to delete an attachment combined with flawed guest order ownership validation. This makes it possible for unauthenticated attackers to delete attachments associated with guest orders using only the publicly available wooccm_upload nonce and attachment ID.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-19
Last Modified
2026-02-19
Generated
2026-05-07
AI Q&A
2026-02-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
woocommerce checkout_field_manager 7.8.1
woocommerce checkout_field_manager to 7.8.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the WooCommerce Checkout Field Manager plugin for WordPress (up to version 7.8.5) is an authorization bypass that allows unauthenticated attackers to delete attachments associated with guest orders. This happens because the plugin does not properly verify if a user is authorized to delete an attachment and has flawed validation of guest order ownership. Attackers can exploit this by using the publicly available wooccm_upload nonce and attachment ID to delete files without proper permissions.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing unauthorized deletion of attachments related to guest orders in your WooCommerce store. Since attachments might include important files uploaded during checkout, their deletion could lead to loss of critical order-related data or documents. Because the attack can be performed by unauthenticated users, it poses a risk of data integrity issues and potential disruption of order processing.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': 'This vulnerability involves unauthorized deletion of attachments via AJAX requests using the publicly available wooccm_upload nonce and attachment ID. Detection can focus on monitoring suspicious AJAX requests to the WooCommerce Checkout Manager endpoints related to attachment deletion.'}, {'type': 'list_item', 'content': "Monitor HTTP POST requests to AJAX endpoints such as those handling attachment deletion (e.g., requests containing parameters like 'wooccm_upload' nonce and 'delete_attachments_ids')."}, {'type': 'list_item', 'content': 'Look for unusual or repeated deletion requests from unauthenticated users or IP addresses.'}, {'type': 'list_item', 'content': 'Use web server logs or network monitoring tools to filter requests to URLs related to WooCommerce Checkout Manager AJAX actions.'}, {'type': 'paragraph', 'content': 'Example commands to detect suspicious activity might include:'}, {'type': 'list_item', 'content': "Using grep on web server access logs to find AJAX deletion attempts: \n`grep -i 'wooccm_upload' /var/log/apache2/access.log | grep 'POST'`"}, {'type': 'list_item', 'content': "Using curl to test if the deletion endpoint is accessible without proper authorization (for testing in a controlled environment): \n`curl -X POST -d 'action=ajax_delete_attachment&nonce=PUBLIC_NONCE&delete_attachments_ids=ATTACHMENT_ID' https://yourdomain.com/wp-admin/admin-ajax.php`"}, {'type': 'list_item', 'content': 'Use intrusion detection systems (IDS) or web application firewalls (WAF) to alert on suspicious POST requests containing the wooccm_upload nonce or attachment deletion parameters.'}] [3, 1]


What immediate steps should I take to mitigate this vulnerability?

The primary mitigation is to update the WooCommerce Checkout Manager plugin to version 7.8.6 or later, which includes fixes for the authorization bypass vulnerability.

  • Apply the plugin update from version 7.8.5 or earlier to 7.8.6 as soon as possible.
  • If immediate update is not possible, restrict access to the AJAX endpoints related to attachment deletion by limiting access to authenticated and authorized users only, for example via web server rules or firewall.
  • Monitor and block suspicious requests attempting to delete attachments using the publicly available nonce.

The update improves file upload handling, nonce verification, and user authorization checks to prevent unauthorized deletion of attachments.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart