Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0845: CWE-862 Missing Authorization in wclovers WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible

0
High
VulnerabilityCVE-2026-0845cvecve-2026-0845cwe-862
Published: Mon Feb 09 2026 (02/09/2026, 23:23:27 UTC)
Source: CVE Database V5
Vendor/Project: wclovers
Product: WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible

Description

CVE-2026-0845 is a high-severity vulnerability in the WCFM – Frontend Manager for WooCommerce plugin that allows authenticated users with Shop Manager-level access to escalate privileges to administrator by exploiting a missing authorization check. The flaw exists in the processing function of the plugin, enabling attackers to modify arbitrary site options, including changing the default user role to administrator and enabling user registration. This vulnerability does not require user interaction but does require authentication with elevated privileges. Exploitation can lead to full site compromise, affecting confidentiality, integrity, and availability of the WordPress site. No known exploits are currently reported in the wild. European organizations using WooCommerce with this plugin are at risk, especially those with active e-commerce platforms. Mitigation involves promptly updating the plugin once a patch is released or applying manual access control restrictions. Countries with high WooCommerce adoption and significant e-commerce sectors, such as Germany, the UK, France, Italy, and Spain, are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/09/2026, 23:45:31 UTC

Technical Analysis

CVE-2026-0845 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WCFM – Frontend Manager for WooCommerce plugin, including its Bookings Subscription Listings Compatible component. The vulnerability arises from the absence of a proper capability check in the 'WCFM_Settings_Controller::processing' function across all versions up to 6.7.24. Authenticated users with Shop Manager or higher privileges can exploit this flaw to update arbitrary WordPress options. A critical attack vector involves changing the default registration role to 'administrator' and enabling user registration, thereby allowing attackers to create accounts with administrative privileges without further authentication. The CVSS 3.1 score of 7.2 reflects a high severity due to network exploitability (AV:N), low attack complexity (AC:L), required privileges (PR:H), no user interaction (UI:N), and high impact on confidentiality, integrity, and availability (C:H/I:H/A:H). Although no public exploits are reported, the vulnerability's nature makes it a significant risk for WordPress sites using this plugin, potentially leading to full site takeover. The vulnerability affects all versions of the plugin up to and including 6.7.24, and no official patch links are currently available, indicating the need for vigilance and interim mitigations.

Potential Impact

For European organizations, especially those operating e-commerce platforms on WordPress with WooCommerce and the WCFM plugin, this vulnerability poses a severe risk. Exploitation can lead to unauthorized administrative access, allowing attackers to manipulate site content, steal sensitive customer data, disrupt services, or install persistent backdoors. This can result in financial losses, reputational damage, and regulatory penalties under GDPR due to data breaches. The ability to escalate privileges from Shop Manager to Administrator means that insider threats or compromised lower-privilege accounts can be leveraged for full site compromise. Given the widespread use of WooCommerce in Europe, particularly in countries with mature e-commerce markets, the threat could affect a broad range of businesses, from SMEs to large enterprises. The lack of known exploits in the wild currently reduces immediate risk but does not diminish the urgency for mitigation due to the vulnerability's straightforward exploitation path.

Mitigation Recommendations

1. Monitor official vendor channels and WordPress plugin repositories for patches addressing CVE-2026-0845 and apply updates immediately upon release. 2. Until a patch is available, restrict Shop Manager-level access to trusted personnel only and audit existing user roles to minimize exposure. 3. Implement additional access control measures at the web server or application firewall level to block unauthorized requests targeting the vulnerable processing function. 4. Disable user registration if not required, or enforce strict validation and monitoring of new user accounts to detect suspicious activity. 5. Conduct regular security audits and review WordPress option settings for unauthorized changes. 6. Employ intrusion detection systems and log monitoring to identify exploitation attempts early. 7. Consider isolating critical WordPress instances or using containerization to limit the blast radius of a potential compromise. 8. Educate administrators and shop managers about the risks of privilege escalation and the importance of secure credential management.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-10T15:14:52.880Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698a6e434b57a58fa1785556

Added to database: 2/9/2026, 11:31:15 PM

Last enriched: 2/9/2026, 11:45:31 PM

Last updated: 2/10/2026, 12:40:08 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats