CVE-2024-8290: CWE-639 Authorization Bypass Through User-Controlled Key in wclovers WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible
CVE-2024-8290 is a high-severity vulnerability in the WCFM – Frontend Manager for WooCommerce plugin for WordPress, affecting all versions up to 6. 7. 12. It is an authorization bypass due to an insecure direct object reference (CWE-639) caused by missing validation on a user-controlled ID key in the processing function. Authenticated users with subscriber or customer-level access can exploit this flaw to change the email address of administrator accounts. This enables them to reset the administrator password and gain full admin control without higher privileges. The vulnerability requires no user interaction beyond authentication and can lead to complete compromise of the affected WordPress site. There are currently no known exploits in the wild, and no patches have been released yet. Organizations using this plugin should urgently review access controls and monitor for suspicious account changes.
AI Analysis
Technical Summary
CVE-2024-8290 is a critical authorization bypass vulnerability identified in the WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress. The flaw exists in the WCFM_Customers_Manage_Controller::processing function, where the plugin fails to properly validate the 'ID' parameter, which is user-controlled. This lack of validation leads to an insecure direct object reference (IDOR), classified under CWE-639, allowing attackers with minimal privileges—specifically subscriber or customer-level authenticated users—to manipulate the email addresses of administrator accounts. By changing the administrator's email, attackers can initiate password reset procedures, effectively gaining full administrative access to the WordPress site. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with an attack vector that is network-based, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability at a high level. The plugin versions up to and including 6.7.12 are affected, and no patches or fixes have been published at the time of disclosure. This vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple user roles and subscription-based access. Exploitation could lead to complete site takeover, data theft, defacement, or further malware deployment. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical impact necessitate immediate attention from site administrators and security teams.
Potential Impact
The impact of CVE-2024-8290 is severe for organizations using the affected WCFM plugin on WordPress. An attacker with only subscriber or customer-level access can escalate privileges to full administrator control by changing the admin email and resetting the password. This leads to a complete compromise of the website, including unauthorized access to sensitive data, modification or deletion of content, installation of malicious code, and disruption of services. For e-commerce sites relying on WooCommerce and this plugin for managing frontend operations and bookings, such a compromise could result in financial losses, reputational damage, and regulatory penalties due to data breaches. The vulnerability undermines the integrity and availability of the site and exposes organizations to further attacks such as ransomware or phishing campaigns launched from the compromised infrastructure. Given the widespread use of WooCommerce and WordPress globally, the threat surface is substantial, especially for small to medium businesses that may lack robust security monitoring and patch management processes.
Mitigation Recommendations
To mitigate CVE-2024-8290, organizations should immediately restrict subscriber and customer-level access privileges to the minimum necessary and monitor for any unusual changes to administrator account details, particularly email addresses. Implement multi-factor authentication (MFA) for all administrator accounts to reduce the risk of account takeover via password reset. Review and harden WordPress user role permissions to prevent unauthorized access to sensitive plugin functions. Until an official patch is released, consider disabling or uninstalling the affected WCFM plugin if feasible, or isolate the affected functionality behind additional access controls such as web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable processing function. Regularly audit logs for signs of exploitation attempts and educate users about phishing risks related to password resets. Stay informed on vendor updates and apply patches promptly once available. Additionally, consider deploying runtime application self-protection (RASP) solutions to detect and block exploitation attempts in real-time.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, India, Brazil, France, Japan, Netherlands, Italy, Spain
CVE-2024-8290: CWE-639 Authorization Bypass Through User-Controlled Key in wclovers WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible
Description
CVE-2024-8290 is a high-severity vulnerability in the WCFM – Frontend Manager for WooCommerce plugin for WordPress, affecting all versions up to 6. 7. 12. It is an authorization bypass due to an insecure direct object reference (CWE-639) caused by missing validation on a user-controlled ID key in the processing function. Authenticated users with subscriber or customer-level access can exploit this flaw to change the email address of administrator accounts. This enables them to reset the administrator password and gain full admin control without higher privileges. The vulnerability requires no user interaction beyond authentication and can lead to complete compromise of the affected WordPress site. There are currently no known exploits in the wild, and no patches have been released yet. Organizations using this plugin should urgently review access controls and monitor for suspicious account changes.
AI-Powered Analysis
Technical Analysis
CVE-2024-8290 is a critical authorization bypass vulnerability identified in the WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress. The flaw exists in the WCFM_Customers_Manage_Controller::processing function, where the plugin fails to properly validate the 'ID' parameter, which is user-controlled. This lack of validation leads to an insecure direct object reference (IDOR), classified under CWE-639, allowing attackers with minimal privileges—specifically subscriber or customer-level authenticated users—to manipulate the email addresses of administrator accounts. By changing the administrator's email, attackers can initiate password reset procedures, effectively gaining full administrative access to the WordPress site. The vulnerability has a CVSS 3.1 base score of 8.8, indicating high severity, with an attack vector that is network-based, low attack complexity, requiring privileges but no user interaction, and impacting confidentiality, integrity, and availability at a high level. The plugin versions up to and including 6.7.12 are affected, and no patches or fixes have been published at the time of disclosure. This vulnerability poses a significant risk to WordPress sites using this plugin, especially those with multiple user roles and subscription-based access. Exploitation could lead to complete site takeover, data theft, defacement, or further malware deployment. Although no known exploits are currently reported in the wild, the ease of exploitation and the critical impact necessitate immediate attention from site administrators and security teams.
Potential Impact
The impact of CVE-2024-8290 is severe for organizations using the affected WCFM plugin on WordPress. An attacker with only subscriber or customer-level access can escalate privileges to full administrator control by changing the admin email and resetting the password. This leads to a complete compromise of the website, including unauthorized access to sensitive data, modification or deletion of content, installation of malicious code, and disruption of services. For e-commerce sites relying on WooCommerce and this plugin for managing frontend operations and bookings, such a compromise could result in financial losses, reputational damage, and regulatory penalties due to data breaches. The vulnerability undermines the integrity and availability of the site and exposes organizations to further attacks such as ransomware or phishing campaigns launched from the compromised infrastructure. Given the widespread use of WooCommerce and WordPress globally, the threat surface is substantial, especially for small to medium businesses that may lack robust security monitoring and patch management processes.
Mitigation Recommendations
To mitigate CVE-2024-8290, organizations should immediately restrict subscriber and customer-level access privileges to the minimum necessary and monitor for any unusual changes to administrator account details, particularly email addresses. Implement multi-factor authentication (MFA) for all administrator accounts to reduce the risk of account takeover via password reset. Review and harden WordPress user role permissions to prevent unauthorized access to sensitive plugin functions. Until an official patch is released, consider disabling or uninstalling the affected WCFM plugin if feasible, or isolate the affected functionality behind additional access controls such as web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable processing function. Regularly audit logs for signs of exploitation attempts and educate users about phishing risks related to password resets. Stay informed on vendor updates and apply patches promptly once available. Additionally, consider deploying runtime application self-protection (RASP) solutions to detect and block exploitation attempts in real-time.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-08-28T20:42:11.811Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6c26b7ef31ef0b5607b9
Added to database: 2/25/2026, 9:39:50 PM
Last enriched: 2/26/2026, 3:55:19 AM
Last updated: 2/26/2026, 7:50:09 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumCVE-2026-2499: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in tgrk Custom Logo
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.