WCFM Frontend Manager: Critical IDOR Allows Admin Deletion
The National Vulnerability Database reports a high-severity Insecure Direct Object Reference (IDOR) vulnerability, CVE-2026-2554, affecting all versions up to and including 6.7.25 of the WCFM – Frontend Manager for WooCommerce and its Bookings Subscription Listings Compatible plugin for WordPress. The flaw, rated 8.1 CVSS (High), stems from insufficient validation on the customerid user-controlled key within the wcfm_delete_wcfm_customer function.
This vulnerability enables authenticated attackers with Vendor-level access or higher to delete arbitrary users. The impact is severe, allowing malicious vendors to purge even Administrator accounts from the WordPress site. This isn’t just about data loss; it’s about complete administrative disruption and potential site takeover through account manipulation.
From an attacker’s perspective, this is a low-hanging fruit with high payoff. A compromised vendor account, or even an insider threat, can leverage this with minimal technical skill. Defenders need to recognize that once an attacker gains even a low-privileged foothold, the blast radius can expand rapidly if IDORs like this aren’t mitigated.
What This Means For You
- If your organization uses WCFM – Frontend Manager for WooCommerce, you need to prioritize patching immediately. This isn't a theoretical risk; it's a direct path for a malicious vendor, or an attacker who compromises a vendor account, to wipe out your administrative structure. Audit your WordPress user logs for any suspicious user deletion activities, especially from vendor accounts. Restrict plugin access to the absolute minimum necessary roles.
Related ATT&CK Techniques
🛡️ Detection Rules
3 rules · 6 SIEM formats3 detection rules auto-generated for this incident, mapped to MITRE ATT&CK. Sigma YAML is free — export to any SIEM format via the Intel Bot.
WCFM Customer Deletion via IDOR - CVE-2026-2554
title: WCFM Customer Deletion via IDOR - CVE-2026-2554
id: scw-2026-05-02-ai-1
status: experimental
level: critical
description: |
Detects the specific WCFM Frontend Manager IDOR vulnerability (CVE-2026-2554) where an attacker with vendor-level access can delete arbitrary users by sending a POST request to 'admin-ajax.php' with the action 'wcfm_delete_wcfm_customer' and a user-controlled 'customerid'. This rule specifically targets the vulnerable endpoint and parameters used in the exploit.
author: SCW Feed Engine (AI-generated)
date: 2026-05-02
references:
- https://shimiscyberworld.com/posts/nvd-CVE-2026-2554/
tags:
- attack.impact
- attack.t1531
logsource:
category: webserver
detection:
selection:
cs-uri|contains:
- '/wp-admin/admin-ajax.php'
cs-method:
- 'POST'
cs-uri-query|contains:
- 'action=wcfm_delete_wcfm_customer'
cs-uri-query|contains:
- 'customerid='
selection_base:
sc-status:
- 200
condition: selection AND selection_base
falsepositives:
- Legitimate administrative activity
Source: Shimi's Cyber World · License & reuse
Indicators of Compromise
| ID | Type | Indicator |
|---|---|---|
| CVE-2026-2554 | IDOR | WCFM - Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress versions <= 6.7.25 |
| CVE-2026-2554 | IDOR | Vulnerable function: 'wcfm_delete_wcfm_customer' |
| CVE-2026-2554 | IDOR | Vulnerable parameter: 'customerid' (missing validation) |
| CVE-2026-2554 | Privilege Escalation | Authenticated attackers with Vendor-level access can delete arbitrary users, including Administrators. |
Source & Attribution
| Source Platform | NVD |
| Channel | National Vulnerability Database |
| Published | May 02, 2026 at 17:16 UTC |
This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.
Believe this infringes your rights? Submit a takedown request.