Home

Description

The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 6.7.25 via multiple AJAX actions including `wcfm_modify_order_status`, `delete_wcfm_article`, `delete_wcfm_product`, and the article management controller due to missing validation on user-supplied object IDs. This makes it possible for authenticated attackers, with Vendor-level access and above, to modify the status of any order, delete or modify any post/product/page, regardless of ownership.

PUBLISHED Reserved 2026-03-26 | Published 2026-04-04 | Updated 2026-04-08 | Assigner Wordfence




HIGH: 8.1CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

Any version
affected

Timeline

2026-01-10:Discovered
2026-02-13:Vendor Notified
2026-04-03:Disclosed

Credits

Osvaldo Noe Gonzalez Del Rio finder

References

www.wordfence.com/...-dff2-4bac-a138-aa40c7ab7a1c?source=cve

plugins.trac.wordpress.org/...ss-wcfm-ajax.php?marks=644,880

plugins.trac.wordpress.org/...ass-wcfm-article.php?marks=271

cve.org (CVE-2026-4896)

nvd.nist.gov (CVE-2026-4896)

Download JSON