Subscriptions for WooCommerce Vulnerability (Medium) – CVE-2026-24372

Subscriptions for WooCommerce Vulnerability (Medium) – CVE-2026-24372

by | Mar 19, 2026 | Plugins

Attack Vectors

CVE-2026-24372 is a Medium-severity vulnerability (CVSS 5.3) affecting the Subscriptions for WooCommerce WordPress plugin (slug: subscriptions-for-woocommerce) in versions up to and including 1.8.10. Because the issue can be triggered by unauthenticated attackers over the network (no login required), it is most relevant to any site that exposes WordPress and WooCommerce to the public internet.

From a business perspective, the key risk is that an external party can potentially reach a plugin function that should be restricted, and perform an unauthorized action without needing a customer account, admin account, or staff access.

Security Weakness

The root cause is a missing capability (authorization) check on a plugin function in Subscriptions for WooCommerce versions ≤ 1.8.10. In practical terms, WordPress plugins should confirm that the requester has the right permissions before allowing sensitive actions—this check was missing, enabling unauthorized access to functionality that should have been protected.

Even when the impact “only” involves limited changes (as reflected by the CVSS vector indicating low integrity impact), missing authorization flaws are important because they can be exploited at scale and may be combined with other weaknesses in a broader attack.

Technical or Business Impacts

While the advisory states an unauthenticated attacker can perform an unauthorized action (without detailing the exact action in the public summary), the business implications commonly include:

Operational disruption and support burden: Unauthorized changes can lead to unexpected storefront behavior, customer confusion, increased refund requests, and higher support volume—especially for subscription-based revenue models.

Revenue and retention risk: Subscription commerce depends on trust and predictable billing/service delivery. Any unauthorized behavior that affects subscription operations can directly impact churn, failed renewals, and brand reputation.

Compliance and governance concerns: A control failure that allows unauthenticated actions can raise audit questions (e.g., around access controls and change management), particularly for organizations with formal compliance requirements.

Recommended remediation: Update Subscriptions for WooCommerce to version 1.9.0 or newer (patched). Reference: CVE-2026-24372 record and the vendor/community write-up from Wordfence: Wordfence vulnerability entry.

Similar Attacks

Unauthorized or unauthenticated access issues in WordPress plugins have historically been used for large-scale exploitation because they are easy to automate and can impact many sites quickly. Examples include:

CVE-2020-25213 (WP File Manager) — an unauthenticated file upload issue that was widely exploited in the wild, demonstrating how quickly attackers move when a plugin flaw enables actions without proper access control.

CVE-2019-9978 (Social Warfare) — a high-impact WordPress plugin vulnerability that was actively abused, illustrating how plugin-level weaknesses can rapidly translate into real business harm.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers