JustAppSec
Back to news

WCFM IDOR lets vendors delete any WordPress user, including admins

2 min readPublished 02 May 2026Source: CVEProject (cvelistV5)

TL;DR - WCFM - Frontend Manager for WooCommerce <= 6.7.25: the wcfm_delete_wcfm_customer action accepts a caller-supplied customerid and deletes the corresponding user with no check that the caller is authorised to act on that target. Any Vendor-level (or higher) account can delete any user on the site, including Administrator accounts.

What happened

WCFM - Frontend Manager for WooCommerce is a WordPress plugin that gives vendors a frontend management dashboard for WooCommerce multi-vendor marketplaces.

CVE-2026-2554 is a textbook Insecure Direct Object Reference (IDOR). The wcfm_delete_wcfm_customer action takes a customerid from the request and deletes the corresponding account. There is no check that the calling vendor owns or is otherwise authorised to touch that user. Supply an administrator's user ID and it gets deleted.

ItemDetail
Affected componentWCFM - Frontend Manager for WooCommerce (WordPress)
Affected versions<= 6.7.25
Vulnerable actionwcfm_delete_wcfm_customer via customerid parameter
Minimum privilege requiredVendor (or equivalent mapped capability)
ImpactArbitrary user deletion, including Administrator accounts
SeverityCVSS 3.1 8.1 (High)

Multi-vendor marketplaces treat vendor accounts as semi-trusted, internet-facing identities - created at scale, often self-serve, prone to credential reuse. A single compromised vendor account is all an attacker needs to wipe Administrator accounts off the site.

Who is impacted

  • WordPress sites running WCFM - Frontend Manager for WooCommerce (slug wc-frontend-manager) at versions <= 6.7.25.
  • Any site where accounts mapped to the WCFM Vendor capability can reach WCFM management actions.
  • Highest risk: marketplaces with many vendors, self-registration enabled, or where vendor accounts are routinely created and abandoned. Credential reuse and account takeover are common in this segment.

What to do now

  • Apply the latest patched release from the plugin author immediately.
  • Inventory production WordPress instances for the plugin slug wc-frontend-manager and confirm no site is running <= 6.7.25.
  • Treat this as a destructive authorisation failure:
    • Review WordPress audit trails and server logs for unexpected user deletions.
    • Confirm all Administrator accounts and their recovery email addresses are intact.
    • Check for any Vendor accounts showing signs of takeover: new sessions, unfamiliar IPs, administrative activity immediately following vendor logins.
  • If compromise is suspected, rotate credentials for affected accounts and review Vendor account access thoroughly before restoring normal operations.

Related


Content is AI-assisted and reviewed by our team, but issues may be missed and best practices evolve rapidly, send corrections to [email protected]. Always consult official documentation and validate key implementation decisions before making design or security choices.

Need help?Get in touch.