Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15147: CWE-639 Authorization Bypass Through User-Controlled Key in wclovers WCFM Membership – WooCommerce Memberships for Multivendor Marketplace

0
Medium
VulnerabilityCVE-2025-15147cvecve-2025-15147cwe-639
Published: Mon Feb 09 2026 (02/09/2026, 23:23:28 UTC)
Source: CVE Database V5
Vendor/Project: wclovers
Product: WCFM Membership – WooCommerce Memberships for Multivendor Marketplace

Description

The WCFM Membership – WooCommerce Memberships for Multivendor Marketplace plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.11.8 via the 'WCFMvm_Memberships_Payment_Controller::processing' due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify other users' membership payments.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:53:22 UTC

Technical Analysis

CVE-2025-15147 identifies a security vulnerability in the WCFM Membership – WooCommerce Memberships for Multivendor Marketplace plugin for WordPress, specifically versions up to and including 2.11.8. The vulnerability is classified as an Insecure Direct Object Reference (IDOR), corresponding to CWE-639, where the application fails to properly validate a user-controlled key parameter within the 'WCFMvm_Memberships_Payment_Controller::processing' function. This lack of validation allows authenticated users with minimal privileges (Subscriber-level or higher) to manipulate membership payment records belonging to other users. The flaw stems from improper authorization checks, enabling attackers to bypass intended access controls and modify payment data integrity without affecting confidentiality or availability. The vulnerability is exploitable remotely over the network without requiring user interaction beyond authentication. The CVSS v3.1 score of 4.3 reflects a medium severity level, driven by low attack complexity and the requirement for authenticated access. No public exploits or patches are currently documented, but the vulnerability poses a risk to the integrity of membership payment data in affected WordPress sites using this plugin.

Potential Impact

The primary impact of CVE-2025-15147 is the unauthorized modification of membership payment information, which can lead to financial discrepancies, fraudulent membership status changes, or disruption of subscription billing processes. While confidentiality and availability remain unaffected, the integrity compromise can undermine trust in the membership system and cause operational challenges for e-commerce platforms relying on this plugin. Organizations may face reputational damage, customer dissatisfaction, and potential financial losses if attackers manipulate payment records. Since the vulnerability requires authenticated access, the risk is limited to users who have at least Subscriber-level privileges, but given that such accounts are common in WordPress environments, the attack surface is significant. The lack of known exploits reduces immediate risk, but the vulnerability remains a concern for any site using vulnerable versions of the plugin, especially those with multiple user roles and membership payment dependencies.

Mitigation Recommendations

To mitigate CVE-2025-15147, organizations should immediately update the WCFM Membership – WooCommerce Memberships for Multivendor Marketplace plugin to a patched version once available. In the absence of an official patch, administrators should implement strict role-based access controls to limit Subscriber-level users from accessing or modifying payment processing functions. Custom code or plugins can be used to enforce additional authorization checks on payment-related endpoints. Monitoring and auditing membership payment changes for unusual activity can help detect exploitation attempts. Disabling or restricting plugin features related to membership payment processing for lower-privileged users until a fix is applied is advisable. Additionally, applying the principle of least privilege to user roles and regularly reviewing user permissions will reduce the attack surface. Organizations should also maintain regular backups of membership data to enable recovery in case of unauthorized modifications.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-27T13:25:09.137Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698a6e434b57a58fa1785551

Added to database: 2/9/2026, 11:31:15 PM

Last enriched: 2/27/2026, 11:53:22 AM

Last updated: 3/27/2026, 4:20:19 AM

Views: 141

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses