CVE-2026-2554
Deferred Deferred - Pending Action
IDOR Vulnerability in WCFM Frontend Manager for WooCommerce

Publication date: 2026-05-02

Last updated on: 2026-05-05

Assigner: Wordfence

Description
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via the 'wcfm_delete_wcfm_customer' due to missing validation on the 'customerid' user controlled key. This makes it possible for authenticated attackers, with Vendor-level access and above, to delete arbitrary users, including Administrators.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-02
Last Modified
2026-05-05
Generated
2026-05-07
AI Q&A
2026-05-02
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
wcfm frontend_manager to 6.7.25 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-639 The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability exists in the WCFM – Frontend Manager for WooCommerce and the Bookings Subscription Listings Compatible plugin for WordPress in all versions up to and including 6.7.25. It is an Insecure Direct Object Reference (IDOR) issue occurring via the 'wcfm_delete_wcfm_customer' function due to missing validation on the 'customerid' parameter, which is controlled by the user.

This flaw allows authenticated attackers who have Vendor-level access or higher to delete arbitrary users, including those with Administrator privileges.


How can this vulnerability impact me? :

An attacker with Vendor-level access or above can exploit this vulnerability to delete any user account, including Administrator accounts.

This can lead to loss of critical user accounts, disruption of service, potential denial of access for legitimate users, and overall compromise of the system's integrity and availability.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart