CVE-2026-1722: CWE-862 Missing Authorization in wclovers WCFM Marketplace – Multivendor Marketplace for WooCommerce
CVE-2026-1722 is a medium-severity vulnerability in the WCFM Marketplace – Multivendor Marketplace for WooCommerce WordPress plugin, affecting all versions up to 3. 7. 0. It arises from missing authorization checks in the `wcfm-refund-requests-form` AJAX controller, allowing unauthenticated attackers to create arbitrary refund requests for any order or item ID. This can lead to unauthorized refund requests and potential financial loss, especially if automatic refund approval is enabled. The vulnerability does not impact confidentiality or availability but compromises integrity by allowing manipulation of refund processes. No known exploits are currently reported in the wild. European organizations using this plugin in their WooCommerce setups should prioritize patching or disabling automatic refund approvals to mitigate risk. Countries with high WooCommerce adoption and significant e-commerce activity, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. Mitigation requires implementing strict authorization checks, disabling automatic refund approvals, and monitoring refund request logs for anomalies.
AI Analysis
Technical Summary
CVE-2026-1722 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WCFM Marketplace – Multivendor Marketplace for WooCommerce plugin for WordPress. The flaw exists in the AJAX controller `wcfm-refund-requests-form`, which processes refund requests without verifying whether the requester is authorized to perform such actions. This lack of authorization checks allows unauthenticated attackers to submit refund requests for arbitrary order IDs and item IDs. If the plugin's settings enable automatic refund approval, these unauthorized refund requests can be processed without manual intervention, resulting in financial losses for vendors and marketplace operators. The vulnerability affects all versions up to and including 3.7.0. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. No patches or fixes have been linked yet, and no known exploits are reported in the wild. The issue highlights a critical security design flaw where authorization controls are omitted in a sensitive transactional process, undermining the trustworthiness of refund operations within the marketplace environment.
Potential Impact
For European organizations operating e-commerce platforms using WooCommerce with the WCFM Marketplace plugin, this vulnerability poses a direct financial risk. Attackers can exploit the missing authorization to generate fraudulent refund requests, potentially draining funds if automatic refund approval is enabled. This undermines the integrity of financial transactions and vendor trust. While confidentiality and availability remain unaffected, the integrity breach can disrupt business operations, cause revenue loss, and damage reputation. Small and medium-sized enterprises (SMEs) relying on automated refund workflows are particularly vulnerable. Additionally, marketplaces with multiple vendors may face disputes and increased administrative overhead to resolve fraudulent refunds. The risk is heightened in countries with widespread WooCommerce adoption and significant online retail sectors, where attackers may target high-volume platforms to maximize financial gain.
Mitigation Recommendations
1. Immediately disable automatic refund approval in the WCFM Marketplace plugin settings to prevent unauthorized refunds from being processed automatically. 2. Apply strict authorization checks in the `wcfm-refund-requests-form` AJAX controller to ensure only authenticated and authorized users can submit refund requests. 3. Monitor refund request logs for unusual patterns, such as multiple refund requests from unauthenticated sources or for high-value orders. 4. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious refund request attempts targeting the vulnerable AJAX endpoint. 5. Keep the plugin updated and apply security patches as soon as they become available from the vendor. 6. Conduct regular security audits and penetration testing focusing on authorization controls in e-commerce workflows. 7. Educate marketplace vendors and administrators about the risks of enabling automatic refund approvals and encourage manual review processes until the vulnerability is fully remediated.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2026-1722: CWE-862 Missing Authorization in wclovers WCFM Marketplace – Multivendor Marketplace for WooCommerce
Description
CVE-2026-1722 is a medium-severity vulnerability in the WCFM Marketplace – Multivendor Marketplace for WooCommerce WordPress plugin, affecting all versions up to 3. 7. 0. It arises from missing authorization checks in the `wcfm-refund-requests-form` AJAX controller, allowing unauthenticated attackers to create arbitrary refund requests for any order or item ID. This can lead to unauthorized refund requests and potential financial loss, especially if automatic refund approval is enabled. The vulnerability does not impact confidentiality or availability but compromises integrity by allowing manipulation of refund processes. No known exploits are currently reported in the wild. European organizations using this plugin in their WooCommerce setups should prioritize patching or disabling automatic refund approvals to mitigate risk. Countries with high WooCommerce adoption and significant e-commerce activity, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. Mitigation requires implementing strict authorization checks, disabling automatic refund approvals, and monitoring refund request logs for anomalies.
AI-Powered Analysis
Technical Analysis
CVE-2026-1722 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the WCFM Marketplace – Multivendor Marketplace for WooCommerce plugin for WordPress. The flaw exists in the AJAX controller `wcfm-refund-requests-form`, which processes refund requests without verifying whether the requester is authorized to perform such actions. This lack of authorization checks allows unauthenticated attackers to submit refund requests for arbitrary order IDs and item IDs. If the plugin's settings enable automatic refund approval, these unauthorized refund requests can be processed without manual intervention, resulting in financial losses for vendors and marketplace operators. The vulnerability affects all versions up to and including 3.7.0. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity but not confidentiality or availability. No patches or fixes have been linked yet, and no known exploits are reported in the wild. The issue highlights a critical security design flaw where authorization controls are omitted in a sensitive transactional process, undermining the trustworthiness of refund operations within the marketplace environment.
Potential Impact
For European organizations operating e-commerce platforms using WooCommerce with the WCFM Marketplace plugin, this vulnerability poses a direct financial risk. Attackers can exploit the missing authorization to generate fraudulent refund requests, potentially draining funds if automatic refund approval is enabled. This undermines the integrity of financial transactions and vendor trust. While confidentiality and availability remain unaffected, the integrity breach can disrupt business operations, cause revenue loss, and damage reputation. Small and medium-sized enterprises (SMEs) relying on automated refund workflows are particularly vulnerable. Additionally, marketplaces with multiple vendors may face disputes and increased administrative overhead to resolve fraudulent refunds. The risk is heightened in countries with widespread WooCommerce adoption and significant online retail sectors, where attackers may target high-volume platforms to maximize financial gain.
Mitigation Recommendations
1. Immediately disable automatic refund approval in the WCFM Marketplace plugin settings to prevent unauthorized refunds from being processed automatically. 2. Apply strict authorization checks in the `wcfm-refund-requests-form` AJAX controller to ensure only authenticated and authorized users can submit refund requests. 3. Monitor refund request logs for unusual patterns, such as multiple refund requests from unauthenticated sources or for high-value orders. 4. Implement web application firewalls (WAFs) with custom rules to detect and block suspicious refund request attempts targeting the vulnerable AJAX endpoint. 5. Keep the plugin updated and apply security patches as soon as they become available from the vendor. 6. Conduct regular security audits and penetration testing focusing on authorization controls in e-commerce workflows. 7. Educate marketplace vendors and administrators about the risks of enabling automatic refund approvals and encourage manual review processes until the vulnerability is fully remediated.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2026-01-30T20:26:54.350Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 698ae2484b57a58fa1eeadc4
Added to database: 2/10/2026, 7:46:16 AM
Last enriched: 2/10/2026, 8:00:33 AM
Last updated: 2/10/2026, 8:51:06 AM
Views: 4
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
RSAC Releases Quantickle Open Source Threat Intelligence Visualization Tool
MediumCVE-2026-2099: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Flowring AgentFlow
MediumCVE-2026-2098: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Flowring AgentFlow
MediumCVE-2026-2097: CWE-434 Unrestricted Upload of File with Dangerous Type in Flowring Agentflow
HighCVE-2026-2096: CWE-288 Authentication Bypass Using an Alternate Path or Channel in Flowring Agentflow
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.