CVE-2025-10173: CWE-862 Missing Authorization in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution
The ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution plugin for WordPress is vulnerable to unauthorized access due to an incorrect capability check on the post_save() function in all versions up to, and including, 4.8.3. This makes it possible for authenticated attackers, with Editor-level access and above, to update the plugin's settings.
AI Analysis
Technical Summary
CVE-2025-10173 is a vulnerability identified in the ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution plugin for WordPress, developed by roxnor. This plugin is widely used to enhance WooCommerce stores by providing advanced page-building capabilities within the Elementor environment. The vulnerability arises from a missing or incorrect authorization check in the post_save() function, which is responsible for saving plugin settings. Specifically, the plugin fails to properly verify whether the authenticated user has sufficient privileges before allowing changes to be made to its configuration. The flaw affects all versions up to and including 4.8.3. Exploitation requires the attacker to have Editor-level access or higher on the WordPress site, which means the attacker must already be authenticated with elevated permissions. Once exploited, the attacker can modify the plugin’s settings, potentially altering store behavior, enabling malicious configurations, or disrupting normal operations. The CVSS v3.1 base score is 2.7, indicating a low severity primarily because the vulnerability requires high privileges (Editor or above), does not impact confidentiality or availability, and does not require user interaction. The vulnerability is classified under CWE-862 (Missing Authorization), highlighting the failure to enforce proper access controls. No known exploits are reported in the wild as of the published date (September 26, 2025), and no patches have been linked yet. However, the presence of this vulnerability in a popular WooCommerce plugin makes it a concern for WordPress-based e-commerce sites that rely on ShopEngine for building their storefronts.
Potential Impact
For European organizations operating WooCommerce stores on WordPress, this vulnerability poses a risk primarily to the integrity of their e-commerce platform configurations. An attacker with Editor-level access could manipulate plugin settings, potentially leading to unauthorized changes in store functionality, pricing, product displays, or integration settings. While the vulnerability does not directly compromise customer data confidentiality or site availability, altered plugin settings could facilitate fraud, disrupt sales processes, or degrade user experience, indirectly impacting business operations and reputation. Given that WooCommerce is widely used across Europe, especially among small and medium-sized enterprises, the risk is non-negligible. Organizations with multiple users having Editor or Administrator roles are at higher risk if internal accounts are compromised or if malicious insiders exist. The low CVSS score reflects limited impact scope, but the potential for misuse in a business-critical plugin warrants attention. Additionally, the lack of known exploits suggests that attackers have not yet widely leveraged this vulnerability, providing a window for proactive mitigation.
Mitigation Recommendations
1. Restrict Editor and Administrator privileges strictly to trusted personnel to reduce the risk of insider threats or compromised accounts. 2. Monitor and audit user activities, especially changes to plugin settings, to detect unauthorized modifications promptly. 3. Implement multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of account compromise. 4. Regularly update the ShopEngine plugin to the latest version once a patch addressing this vulnerability is released by the vendor. 5. In the absence of an official patch, consider temporarily limiting the use of the affected plugin or disabling features that allow settings modification until a fix is available. 6. Employ WordPress security plugins that can enforce stricter capability checks or provide additional access control layers. 7. Conduct internal security awareness training emphasizing the importance of safeguarding privileged accounts and recognizing suspicious activities.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-10173: CWE-862 Missing Authorization in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution
Description
The ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution plugin for WordPress is vulnerable to unauthorized access due to an incorrect capability check on the post_save() function in all versions up to, and including, 4.8.3. This makes it possible for authenticated attackers, with Editor-level access and above, to update the plugin's settings.
AI-Powered Analysis
Technical Analysis
CVE-2025-10173 is a vulnerability identified in the ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution plugin for WordPress, developed by roxnor. This plugin is widely used to enhance WooCommerce stores by providing advanced page-building capabilities within the Elementor environment. The vulnerability arises from a missing or incorrect authorization check in the post_save() function, which is responsible for saving plugin settings. Specifically, the plugin fails to properly verify whether the authenticated user has sufficient privileges before allowing changes to be made to its configuration. The flaw affects all versions up to and including 4.8.3. Exploitation requires the attacker to have Editor-level access or higher on the WordPress site, which means the attacker must already be authenticated with elevated permissions. Once exploited, the attacker can modify the plugin’s settings, potentially altering store behavior, enabling malicious configurations, or disrupting normal operations. The CVSS v3.1 base score is 2.7, indicating a low severity primarily because the vulnerability requires high privileges (Editor or above), does not impact confidentiality or availability, and does not require user interaction. The vulnerability is classified under CWE-862 (Missing Authorization), highlighting the failure to enforce proper access controls. No known exploits are reported in the wild as of the published date (September 26, 2025), and no patches have been linked yet. However, the presence of this vulnerability in a popular WooCommerce plugin makes it a concern for WordPress-based e-commerce sites that rely on ShopEngine for building their storefronts.
Potential Impact
For European organizations operating WooCommerce stores on WordPress, this vulnerability poses a risk primarily to the integrity of their e-commerce platform configurations. An attacker with Editor-level access could manipulate plugin settings, potentially leading to unauthorized changes in store functionality, pricing, product displays, or integration settings. While the vulnerability does not directly compromise customer data confidentiality or site availability, altered plugin settings could facilitate fraud, disrupt sales processes, or degrade user experience, indirectly impacting business operations and reputation. Given that WooCommerce is widely used across Europe, especially among small and medium-sized enterprises, the risk is non-negligible. Organizations with multiple users having Editor or Administrator roles are at higher risk if internal accounts are compromised or if malicious insiders exist. The low CVSS score reflects limited impact scope, but the potential for misuse in a business-critical plugin warrants attention. Additionally, the lack of known exploits suggests that attackers have not yet widely leveraged this vulnerability, providing a window for proactive mitigation.
Mitigation Recommendations
1. Restrict Editor and Administrator privileges strictly to trusted personnel to reduce the risk of insider threats or compromised accounts. 2. Monitor and audit user activities, especially changes to plugin settings, to detect unauthorized modifications promptly. 3. Implement multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of account compromise. 4. Regularly update the ShopEngine plugin to the latest version once a patch addressing this vulnerability is released by the vendor. 5. In the absence of an official patch, consider temporarily limiting the use of the affected plugin or disabling features that allow settings modification until a fix is available. 6. Employ WordPress security plugins that can enforce stricter capability checks or provide additional access control layers. 7. Conduct internal security awareness training emphasizing the importance of safeguarding privileged accounts and recognizing suspicious activities.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-09-09T14:06:52.606Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68d60d329e21be37e93b46fd
Added to database: 9/26/2025, 3:49:06 AM
Last enriched: 9/26/2025, 4:01:41 AM
Last updated: 9/26/2025, 5:04:04 AM
Views: 4
Related Threats
CVE-2025-9490: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in danieliser Popup Maker – Boost Sales, Conversions, Optins, Subscribers with the Ultimate WP Popups Builder
MediumCVE-2025-10747: CWE-434 Unrestricted Upload of File with Dangerous Type in gamerz WP-DownloadManager
HighCVE-2025-9985: CWE-532 Insertion of Sensitive Information into Log File in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-9984: CWE-862 Missing Authorization in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-10037: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in marceljm Featured Image from URL (FIFU)
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.