Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1722: CWE-862 Missing Authorization in wclovers WCFM Marketplace – Multivendor Marketplace for WooCommerce

0
Medium
VulnerabilityCVE-2026-1722cvecve-2026-1722cwe-862
Published: Tue Feb 10 2026 (02/10/2026, 07:27:00 UTC)
Source: CVE Database V5
Vendor/Project: wclovers
Product: WCFM Marketplace – Multivendor Marketplace for WooCommerce

Description

CVE-2026-1722 is a medium-severity vulnerability in the WCFM Marketplace – Multivendor Marketplace for WooCommerce WordPress plugin, affecting all versions up to 3. 7. 0. It arises from missing authorization checks in the `wcfm-refund-requests-form` AJAX controller, allowing unauthenticated attackers to create arbitrary refund requests for any order or item ID. This can lead to unauthorized refund requests and potential financial loss, especially if automatic refund approval is enabled. The vulnerability does not impact confidentiality or availability but compromises integrity by allowing manipulation of refund processes. No known exploits are currently reported in the wild. European organizations using this plugin in their WooCommerce setups should prioritize patching or disabling automatic refund approvals to mitigate risk. Countries with high WooCommerce adoption and significant e-commerce activity, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. Mitigation requires implementing strict authorization checks, disabling automatic refund approvals, and monitoring refund request logs for anomalies.

AI-Powered Analysis

AILast updated: 02/10/2026, 08:00:33 UTC

Technical Analysis

CVE-2026-1722 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WCFM Marketplace – Multivendor Marketplace for WooCommerce plugin for WordPress. The flaw exists in the AJAX controller `wcfm-refund-requests-form`, which processes refund requests without verifying whether the requester is authorized to perform such actions. This lack of authorization checks allows unauthenticated attackers to submit refund requests for arbitrary order IDs and item IDs. If the plugin's settings enable automatic refund approval, these unauthorized refund requests can be processed without manual intervention, resulting in financial losses for vendors and marketplace operators. The vulnerability affects all versions up to and including 3.7.0. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. No patches or fixes have been linked yet, and no known exploits are reported in the wild. The issue highlights a critical security design flaw where authorization controls are omitted in a sensitive transactional process, undermining the trustworthiness of refund operations within the marketplace environment.

Potential Impact

For European organizations operating e-commerce platforms using WooCommerce with the WCFM Marketplace plugin, this vulnerability poses a direct financial risk. Attackers can exploit the missing authorization to generate fraudulent refund requests, potentially draining funds if automatic refund approval is enabled. This undermines the integrity of financial transactions and vendor trust. While confidentiality and availability remain unaffected, the integrity breach can disrupt business operations, cause revenue loss, and damage reputation. Small and medium-sized enterprises (SMEs) relying on automated refund workflows are particularly vulnerable. Additionally, marketplaces with multiple vendors may face disputes and increased administrative overhead to resolve fraudulent refunds. The risk is heightened in countries with widespread WooCommerce adoption and significant online retail sectors, where attackers may target high-volume platforms to maximize financial gain.

Mitigation Recommendations

1. Immediately disable automatic refund approval in the WCFM Marketplace plugin settings to prevent unauthorized refunds from being processed automatically. 2. Apply strict authorization checks in the `wcfm-refund-requests-form` AJAX controller to ensure only authenticated and authorized users can submit refund requests. 3. Monitor refund request logs for unusual patterns, such as multiple refund requests from unauthenticated sources or for high-value orders. 4. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious refund request attempts targeting the vulnerable AJAX endpoint. 5. Keep the plugin updated and apply security patches as soon as they become available from the vendor. 6. Conduct regular security audits and penetration testing focusing on authorization controls in e-commerce workflows. 7. Educate marketplace vendors and administrators about the risks of enabling automatic refund approvals and encourage manual review processes until the vulnerability is fully remediated.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-30T20:26:54.350Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698ae2484b57a58fa1eeadc4

Added to database: 2/10/2026, 7:46:16 AM

Last enriched: 2/10/2026, 8:00:33 AM

Last updated: 2/10/2026, 8:51:06 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats