Conditional Checkout Fields & Edit Checkout Fields for WooCommerce …

Conditional Checkout Fields & Edit Checkout Fields for WooCommerce …

by | Feb 25, 2026 | Plugins

Attack Vectors

The WordPress plugin Conditional Checkout Fields & Edit Checkout Fields for WooCommerce (slug: conditional-checkout-fields-for-woocommerce) is affected by CVE-2022-45070, a Medium severity issue (CVSS 5.3; vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N).

Because the weakness can be triggered over the network and does not require a logged-in user, an unauthenticated attacker may be able to send crafted requests to your site that result in unauthorized changes to plugin-managed checkout field data. For ecommerce sites, the checkout flow is a high-value target because small changes can create outsized operational and customer-experience issues.

Reference: CVE-2022-45070 record and Wordfence vulnerability advisory.

Security Weakness

This vulnerability is described as a missing authorization (capability) check in versions up to and including 1.2.3. In practical business terms, that means some actions that should be limited to trusted administrators were not properly restricted, allowing unauthorized parties to modify data.

Remediation is straightforward: update to version 1.2.4 or newer, which includes the vendor’s patch. If your organization has change-management requirements, prioritize this update because checkout behavior directly affects revenue, customer trust, and compliance obligations tied to transaction integrity.

Technical or Business Impacts

The primary risk is unauthorized modification (integrity impact). Depending on how your checkout fields are used, this can translate into real business disruption, including: higher cart abandonment due to confusing or incorrect checkout forms, increased support tickets, fulfillment delays caused by missing/incorrect customer data, and potential disputes if order data collection becomes inconsistent.

Even though this issue is rated Medium and does not indicate direct data theft in the advisory (no confidentiality impact is listed), leaders should treat checkout manipulation as a revenue and brand-risk event. If you operate under compliance or audit expectations, unexpected changes to checkout data collection can also create documentation and control concerns (for example, whether required customer information is consistently captured).

Recommended next steps: (1) update the plugin to 1.2.4+; (2) review recent checkout field configuration for unexpected changes; (3) monitor site logs and security alerts for suspicious, repeated requests to WooCommerce/WordPress endpoints; and (4) ensure least-privilege access and a web application firewall are in place to reduce exposure to unauthenticated probing.

Similar Attacks

Unauthorized or unauthenticated actions caused by missing or weak access controls are a common pattern in WordPress plugin incidents. A few well-documented examples include:

CVE-2020-25213 (WP File Manager) – widely exploited issue that enabled severe unauthorized actions due to insufficient protections in a plugin component.
CVE-2019-9978 (Social Warfare) – a WordPress plugin vulnerability that became a high-impact example of how plugin weaknesses can be leveraged to harm sites at scale.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers