CVE-2025-13930
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows attackers to delete attachments linked to guest orders on WooCommerce sites, even if they are not logged in. It happens because the plugin fails to properly check if a user has permission to delete those attachments, making it easy for anyone to exploit this flaw using just a specific nonce and attachment ID.
Technical Description
The Checkout Field Manager (Checkout Manager) for WooCommerce plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 7.8.5. This is due to the plugin not properly verifying that a user is authorized to delete an attachment combined with flawed guest order ownership validation. This makes it possible for unauthenticated attackers to delete attachments associated with guest orders using only the publicly available wooccm_upload nonce and attachment ID.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 19, 2026
about 2 months ago
Last Modified
Feb 19, 2026
about 2 months ago