The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2026-2554

CVE-2026-2554: WCFM Plugin Auth Bypass Vulnerability

CVE-2026-2554 is an authentication bypass flaw in WCFM – Frontend Manager for WooCommerce plugin that enables vendor-level attackers to delete arbitrary users. This article covers technical details, affected versions, and mitigation.

Published: May 7, 2026

CVE-2026-2554 Overview

CVE-2026-2554 is an Insecure Direct Object Reference (IDOR) vulnerability in the WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible plugin for WordPress. The flaw affects all versions up to and including 6.7.25. The plugin fails to validate the customerid user-controlled key in the wcfm_delete_wcfm_customer function. Authenticated attackers with Vendor-level access or higher can delete arbitrary users on the WordPress site, including Administrators. The vulnerability is tracked under CWE-639: Authorization Bypass Through User-Controlled Key.

Critical Impact

Vendor-level users can delete any account on the WordPress installation, including Administrator accounts, leading to integrity and availability loss across the storefront.

Affected Products

  • WCFM – Frontend Manager for WooCommerce along with Bookings Subscription Listings Compatible (WordPress plugin)
  • All plugin versions up to and including 6.7.25
  • Fixed in changeset 3483695 (post-6.7.25 release)

Discovery Timeline

  • 2026-05-02 - CVE-2026-2554 published to NVD
  • 2026-05-05 - Last updated in NVD database

Technical Details for CVE-2026-2554

Vulnerability Analysis

The WCFM plugin extends WooCommerce with multivendor functionality, allowing vendors to manage their own storefronts and customer relationships from the front end. The wcfm_delete_wcfm_customer action is intended to allow vendors to remove customers associated with their own store. The implementation in class-wcfm-customer.php accepts a customerid parameter from the request and processes the deletion without verifying that the supplied identifier belongs to a customer the requesting vendor has authority over.

Because the handler trusts the client-supplied identifier, an authenticated vendor can substitute any user ID, including the ID of a site Administrator. The deletion proceeds against the WordPress users table, removing the targeted account. This produces an integrity and availability impact on the site, since removing administrators disrupts site management and content ownership.

Root Cause

The root cause is missing authorization on a user-controlled key. The wcfm_delete_wcfm_customer callback validates that the request originates from an authenticated vendor but does not validate that the customerid value maps to a user the vendor is permitted to manage. This pattern is the classic IDOR weakness described in CWE-639.

Attack Vector

Exploitation requires an authenticated session at Vendor role or above. The attacker submits a crafted request to the WCFM customer deletion endpoint with the customerid parameter set to the WordPress user ID of the target account. No user interaction is required, and the request is delivered over the network to the affected site. See the vulnerable code path in the WordPress Plugin Code Reference and the corrective WordPress Changeset Update.

No public proof-of-concept exploit has been published. Refer to the Wordfence Vulnerability Report for additional analysis.

Detection Methods for CVE-2026-2554

Indicators of Compromise

  • Unexpected deletion of Administrator or Editor accounts in the WordPress users table.
  • POST requests to the WCFM AJAX endpoint invoking action wcfm_delete_wcfm_customer with customerid values that do not correspond to the requesting vendor's customer base.
  • Audit log gaps where high-privilege user records disappear without a corresponding admin-initiated action.

Detection Strategies

  • Monitor web server logs for HTTP requests containing the parameter string wcfm_delete_wcfm_customer originating from non-administrator sessions.
  • Compare the WordPress wp_users table against periodic backups to surface unauthorized deletions.
  • Enable a WordPress activity log plugin to record delete_user events and correlate them with the originating request and authenticated role.

Monitoring Recommendations

  • Alert when any non-administrator role triggers a delete_user capability check inside WordPress.
  • Track changes to the count of users assigned the administrator role and alert on any decrease.
  • Forward WordPress and WooCommerce logs to a centralized SIEM or data lake for retention and correlation with vendor account activity.

How to Mitigate CVE-2026-2554

Immediate Actions Required

  • Update the WCFM – Frontend Manager plugin to a version higher than 6.7.25 that includes the fix from changeset 3483695.
  • Audit the WordPress users table for unexpected account deletions and restore from backup where required.
  • Review existing Vendor accounts and remove any that are inactive, unrecognized, or unnecessary.

Patch Information

The vendor addressed the missing authorization check in WordPress Changeset 3483695, which adds validation against the user-supplied customerid before deletion proceeds. Site operators should upgrade through the WordPress plugin updater or by deploying the patched release directly.

Workarounds

  • Restrict creation of new Vendor accounts and require manual approval until the patch is applied.
  • Place a Web Application Firewall rule in front of the site that blocks requests containing action=wcfm_delete_wcfm_customer from authenticated sessions that are not administrators.
  • Temporarily deactivate the WCFM plugin if vendor self-service is not business-critical until the upgrade is complete.
bash
# Configuration example: temporarily block the vulnerable action via .htaccess
<IfModule mod_rewrite.c>
  RewriteEngine On
  RewriteCond %{QUERY_STRING} (^|&)action=wcfm_delete_wcfm_customer(&|$) [NC]
  RewriteRule ^ - [F,L]
</IfModule>

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechWordpress

  • SeverityHIGH

  • CVSS Score8.1

  • EPSS Probability0.03%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-639
  • Technical References
  • WordPress Plugin Code Reference

  • WordPress Changeset Update

  • Wordfence Vulnerability Report
  • Related CVEs
  • CVE-2026-6512: InfusedWoo Pro Authorization Bypass Flaw

  • CVE-2026-6145: WordPress User Registration Auth Bypass

  • CVE-2026-8181: Burst Statistics Auth Bypass Vulnerability

  • CVE-2026-7525: My Calendar WordPress Auth Bypass Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English