Skip to main content

CVE-2025-10173: CWE-862 Missing Authorization in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution

Low
VulnerabilityCVE-2025-10173cvecve-2025-10173cwe-862
Published: Fri Sep 26 2025 (09/26/2025, 03:25:33 UTC)
Source: CVE Database V5
Vendor/Project: roxnor
Product: ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution

Description

The ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution plugin for WordPress is vulnerable to unauthorized access due to an incorrect capability check on the post_save() function in all versions up to, and including, 4.8.3. This makes it possible for authenticated attackers, with Editor-level access and above, to update the plugin's settings.

AI-Powered Analysis

AILast updated: 09/26/2025, 04:01:41 UTC

Technical Analysis

CVE-2025-10173 is a vulnerability identified in the ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution plugin for WordPress, developed by roxnor. This plugin is widely used to enhance WooCommerce stores by providing advanced page-building capabilities within the Elementor environment. The vulnerability arises from a missing or incorrect authorization check in the post_save() function, which is responsible for saving plugin settings. Specifically, the plugin fails to properly verify whether the authenticated user has sufficient privileges before allowing changes to be made to its configuration. The flaw affects all versions up to and including 4.8.3. Exploitation requires the attacker to have Editor-level access or higher on the WordPress site, which means the attacker must already be authenticated with elevated permissions. Once exploited, the attacker can modify the plugin’s settings, potentially altering store behavior, enabling malicious configurations, or disrupting normal operations. The CVSS v3.1 base score is 2.7, indicating a low severity primarily because the vulnerability requires high privileges (Editor or above), does not impact confidentiality or availability, and does not require user interaction. The vulnerability is classified under CWE-862 (Missing Authorization), highlighting the failure to enforce proper access controls. No known exploits are reported in the wild as of the published date (September 26, 2025), and no patches have been linked yet. However, the presence of this vulnerability in a popular WooCommerce plugin makes it a concern for WordPress-based e-commerce sites that rely on ShopEngine for building their storefronts.

Potential Impact

For European organizations operating WooCommerce stores on WordPress, this vulnerability poses a risk primarily to the integrity of their e-commerce platform configurations. An attacker with Editor-level access could manipulate plugin settings, potentially leading to unauthorized changes in store functionality, pricing, product displays, or integration settings. While the vulnerability does not directly compromise customer data confidentiality or site availability, altered plugin settings could facilitate fraud, disrupt sales processes, or degrade user experience, indirectly impacting business operations and reputation. Given that WooCommerce is widely used across Europe, especially among small and medium-sized enterprises, the risk is non-negligible. Organizations with multiple users having Editor or Administrator roles are at higher risk if internal accounts are compromised or if malicious insiders exist. The low CVSS score reflects limited impact scope, but the potential for misuse in a business-critical plugin warrants attention. Additionally, the lack of known exploits suggests that attackers have not yet widely leveraged this vulnerability, providing a window for proactive mitigation.

Mitigation Recommendations

1. Restrict Editor and Administrator privileges strictly to trusted personnel to reduce the risk of insider threats or compromised accounts. 2. Monitor and audit user activities, especially changes to plugin settings, to detect unauthorized modifications promptly. 3. Implement multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of account compromise. 4. Regularly update the ShopEngine plugin to the latest version once a patch addressing this vulnerability is released by the vendor. 5. In the absence of an official patch, consider temporarily limiting the use of the affected plugin or disabling features that allow settings modification until a fix is available. 6. Employ WordPress security plugins that can enforce stricter capability checks or provide additional access control layers. 7. Conduct internal security awareness training emphasizing the importance of safeguarding privileged accounts and recognizing suspicious activities.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-09T14:06:52.606Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68d60d329e21be37e93b46fd

Added to database: 9/26/2025, 3:49:06 AM

Last enriched: 9/26/2025, 4:01:41 AM

Last updated: 9/26/2025, 5:04:04 AM

Views: 4

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats