CVE-2025-13930

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows attackers to delete attachments linked to guest orders on WooCommerce sites, even if they are not logged in. It happens because the plugin fails to properly check if a user has permission to delete those attachments, making it easy for anyone to exploit this flaw using just a specific nonce and attachment ID.

Technical Description

The Checkout Field Manager (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 7.8.5. This is due to the plugin not properly verifying that a user is authorized to delete an attachment combined with flawed guest order ownership validation. This makes it possible for unauthenticated attackers to delete attachments associated with guest orders using only the publicly available wooccm_upload nonce and attachment ID.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$724($500-$1K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Feb 19, 2026

about 2 months ago

Last Modified

Feb 19, 2026

about 2 months ago