Subscription for WooCommerce – WordPress Recurring Payments Plugin …

Subscription for WooCommerce – WordPress Recurring Payments Plugin …

by | Mar 12, 2026 | Plugins

Attack Vectors

CVE-2025-69347 affects the Subscription for WooCommerce – WordPress Recurring Payments Plugin (slug: subscription) in versions 1.8.10 and earlier. This is an authenticated issue, meaning an attacker must be logged in with Customer (Custom-level) access or higher to attempt exploitation.

The attack typically involves a logged-in user manipulating a user-controlled key in a request so the plugin references an object they should not be able to access. Because no user interaction is required beyond the attacker’s own actions, this can be executed quietly and repeatedly once an account is available.

Security Weakness

This vulnerability is classified as an Insecure Direct Object Reference (IDOR). In practical terms, the plugin does not perform sufficient validation/authorization checks on a user-supplied identifier before executing an action. When authorization is missing or incomplete, the system may allow a user to act on an object that belongs to someone else or is outside their permitted scope.

Wordfence rates this issue as Medium severity with a CVSS score of 4.3 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N). The vendor remediation is to update to version 1.8.11 or newer, which includes the fix.

Technical or Business Impacts

Although the CVSS scoring indicates no direct confidentiality impact and a limited integrity impact, this kind of authorization flaw can still create meaningful business risk in subscription-driven operations. The key concern is that a legitimate customer account (including a compromised customer account) could potentially trigger unauthorized actions within subscription or recurring-payment workflows.

For marketing, finance, and compliance stakeholders, the downstream impacts can include: disruption to customer lifecycle programs (renewals, retention, win-back), increased support burden from billing/subscription anomalies, and avoidable customer trust issues if users experience unexpected changes. Even if the impact is “limited” per transaction, repeated misuse can create measurable operational friction and reconciliation work.

Recommended action: confirm the plugin version in use and prioritize upgrading Subscription for WooCommerce – WordPress Recurring Payments Plugin to 1.8.11+. If immediate patching is delayed, consider tightening customer account protections (strong passwords, MFA where possible) and reviewing logs for unusual authenticated activity patterns related to subscription actions.

Similar Attacks

IDOR and broken access control issues are common across web applications because they often stem from missing server-side authorization checks. Examples of real-world IDOR-style incidents include:

Panera Bread customer data leak (KrebsOnSecurity, 2018)
Peloton API flaw enabling access to user data via predictable identifiers (The Register, 2021)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers