CVE-2026-0845
7.2 HIGHPublished 2026-02-10 · Modified 2026-02-10 · Received
Quick Summary
A vulnerability in the WCFM plugin for WordPress allows users with Shop Manager access or higher to change any website setting. This is possible because the plugin fails to properly check if a user has permission before processing certain requests.
Who is affected
WordPress sites using the WCFM plugin up to version 6.7.24 are affected. An attacker with a Shop Manager account could change critical settings to take over the site or disrupt its operation.
Recommended fix
Immediately update the WCFM plugin to a version newer than 6.7.24. If an update is not available, consider disabling the plugin until a patched version is released.
Technical Description
The WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the 'WCFM_Settings_Controller::processing' function in all versions up to, and including, 6.7.24. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site.
CVSS Details
Attack Vector
NETWORK
Complexity
LOW
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CWE
CWE-862
References
- https://plugins.trac.wordpress.org/browser/wc-frontend-manager/tags/6.7.24/controllers/settings/wcfm-controller-settings.php#L150
- https://plugins.trac.wordpress.org/browser/wc-frontend-manager/tags/6.7.24/core/class-wcfm-ajax.php#L285
- https://plugins.trac.wordpress.org/changeset/3455819/wc-frontend-manager/trunk/controllers/settings/wcfm-controller-settings.php
- https://www.wordfence.com/threat-intel/vulnerabilities/id/4973cef3-dddf-4eb5-99f4-c23a0e162fd6?source=cve