Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11888: CWE-863 Incorrect Authorization in roxnor ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution

0
Low
VulnerabilityCVE-2025-11888cvecve-2025-11888cwe-863
Published: Sat Oct 25 2025 (10/25/2025, 05:31:21 UTC)
Source: CVE Database V5
Vendor/Project: roxnor
Product: ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution

Description

The ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution plugin for WordPress is vulnerable to unauthorized modification of data due to an insufficient capability check on the post_deactive() function and post_activate() function in all versions up to, and including, 4.8.4. This makes it possible for authenticated attackers, with Editor-level access and above, to activate and deactivate licenses.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 19:38:30 UTC

Technical Analysis

CVE-2025-11888 identifies an authorization vulnerability in the ShopEngine Elementor WooCommerce Builder Addon – All in One WooCommerce Solution plugin for WordPress, affecting all versions up to and including 4.8.4. The vulnerability arises due to insufficient capability checks within the post_deactive() and post_activate() functions, which handle license activation and deactivation processes. Specifically, the plugin fails to properly verify whether the authenticated user has the necessary permissions to perform these actions. As a result, any authenticated user with Editor-level access or higher can manipulate license states, potentially enabling or disabling licenses without proper authorization. This flaw is categorized under CWE-863 (Incorrect Authorization). The CVSS v3.1 base score is 2.7, reflecting a low severity primarily because exploitation requires authenticated access with elevated privileges (Editor or above), no user interaction is needed, and the impact is limited to integrity (license modification) without affecting confidentiality or availability. No public exploits or patches are currently known, and the vulnerability was published on October 25, 2025. The plugin is widely used in WordPress e-commerce sites leveraging WooCommerce, making this a relevant concern for online retailers and service providers using this solution.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification of license activation status within the affected plugin. This could lead to scenarios where attackers with Editor-level access could deactivate valid licenses or activate licenses improperly, potentially disrupting legitimate plugin functionality or enabling unauthorized use of licensed features. While this does not directly compromise sensitive data confidentiality or system availability, it undermines the integrity of license management, which could have downstream effects on business operations, compliance, and revenue protection. For organizations relying on this plugin for e-commerce functionality, unauthorized license manipulation could cause service disruptions or financial losses. However, since exploitation requires elevated authenticated access, the risk is mitigated somewhat by proper access control. No known exploits in the wild reduce immediate threat urgency but do not eliminate the need for remediation.

Mitigation Recommendations

1. Restrict Editor-level and higher privileges strictly to trusted personnel to minimize the risk of exploitation. 2. Monitor user activities related to license activation and deactivation within the WordPress admin dashboard to detect suspicious behavior. 3. Implement additional access control mechanisms or custom capability checks for license management functions if possible. 4. Regularly update the ShopEngine Elementor WooCommerce Builder Addon plugin as soon as the vendor releases a patch addressing this vulnerability. 5. Consider using WordPress security plugins that can enforce granular permission controls and audit logs. 6. Conduct periodic reviews of user roles and permissions to ensure least privilege principles are enforced. 7. If feasible, temporarily disable license activation/deactivation features or restrict them via custom code until a patch is available. 8. Educate site administrators about the risks of privilege misuse and the importance of secure credential management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-10-16T18:42:51.068Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68fc626907185a1a52fd7613

Added to database: 10/25/2025, 5:38:49 AM

Last enriched: 2/27/2026, 7:38:30 PM

Last updated: 3/22/2026, 2:04:10 AM

Views: 243

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses