CVE-2025-12091: CWE-862 Missing Authorization in instantsearchplus Search, Filters & Merchandising for WooCommerce
The Search, Filters & Merchandising for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wcis_save_email' endpoint in all versions up to, and including, 3.0.63. This makes it possible for authenticated attackers, with Subscriber-level access and above, to deactivate the plugin.
AI Analysis
Technical Summary
CVE-2025-12091 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Search, Filters & Merchandising for WooCommerce plugin for WordPress, up to and including version 3.0.63. The issue arises because the plugin's 'wcis_save_email' endpoint lacks proper capability checks, allowing any authenticated user with Subscriber-level privileges or higher to invoke this endpoint and deactivate the plugin. This means that users who normally have minimal permissions can escalate their influence to disrupt plugin functionality without needing administrator rights. The vulnerability does not expose sensitive data (no confidentiality impact) nor does it cause denial of service or availability loss beyond the plugin deactivation (no availability impact). However, it compromises the integrity of the plugin's operational state by allowing unauthorized modification. The attack vector is network-based (remote), with low attack complexity and no user interaction required. The scope is limited to installations running the affected plugin versions. No known exploits have been reported in the wild, and no official patches have been released yet. The CVSS v3.1 base score is 4.3 (medium), reflecting the moderate risk posed by this vulnerability. The vulnerability was publicly disclosed on December 6, 2025, with Wordfence as the assigner. Given the widespread use of WooCommerce in e-commerce, this vulnerability could be leveraged by low-privilege users to disrupt merchandising features, potentially impacting sales and user experience.
Potential Impact
For European organizations, especially those operating e-commerce websites using WooCommerce with the affected plugin, this vulnerability can lead to unauthorized deactivation of key merchandising and search filtering features. While it does not directly expose customer data or cause full service outages, the loss of plugin functionality can degrade user experience, reduce sales conversion rates, and damage brand reputation. Attackers with minimal privileges (Subscriber role) can exploit this flaw, which increases the risk from insider threats or compromised low-level accounts. In regulated sectors, such as retail and finance, disruption of e-commerce capabilities could have financial and compliance repercussions. The impact is primarily operational and reputational rather than data breach related. Organizations relying heavily on WooCommerce merchandising features should consider this vulnerability a moderate risk that could affect business continuity and customer satisfaction.
Mitigation Recommendations
Immediate mitigation steps include auditing user roles and permissions to ensure that Subscriber-level accounts are tightly controlled and monitored. Restrict access to the 'wcis_save_email' endpoint by implementing web application firewall (WAF) rules or custom access controls to block unauthorized requests. Disable or remove unused Subscriber accounts and enforce strong authentication policies to reduce risk from compromised accounts. Monitor plugin activity logs for unusual deactivation attempts. Since no official patch is currently available, organizations should prepare to apply updates promptly once released by the vendor. Additionally, consider isolating the WooCommerce environment or using plugin hardening tools that enforce capability checks. Regularly back up plugin configurations and site data to enable quick recovery if unauthorized changes occur. Engage with the plugin vendor or community to track patch releases and vulnerability disclosures.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12091: CWE-862 Missing Authorization in instantsearchplus Search, Filters & Merchandising for WooCommerce
Description
The Search, Filters & Merchandising for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wcis_save_email' endpoint in all versions up to, and including, 3.0.63. This makes it possible for authenticated attackers, with Subscriber-level access and above, to deactivate the plugin.
AI-Powered Analysis
Technical Analysis
CVE-2025-12091 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Search, Filters & Merchandising for WooCommerce plugin for WordPress, up to and including version 3.0.63. The issue arises because the plugin's 'wcis_save_email' endpoint lacks proper capability checks, allowing any authenticated user with Subscriber-level privileges or higher to invoke this endpoint and deactivate the plugin. This means that users who normally have minimal permissions can escalate their influence to disrupt plugin functionality without needing administrator rights. The vulnerability does not expose sensitive data (no confidentiality impact) nor does it cause denial of service or availability loss beyond the plugin deactivation (no availability impact). However, it compromises the integrity of the plugin's operational state by allowing unauthorized modification. The attack vector is network-based (remote), with low attack complexity and no user interaction required. The scope is limited to installations running the affected plugin versions. No known exploits have been reported in the wild, and no official patches have been released yet. The CVSS v3.1 base score is 4.3 (medium), reflecting the moderate risk posed by this vulnerability. The vulnerability was publicly disclosed on December 6, 2025, with Wordfence as the assigner. Given the widespread use of WooCommerce in e-commerce, this vulnerability could be leveraged by low-privilege users to disrupt merchandising features, potentially impacting sales and user experience.
Potential Impact
For European organizations, especially those operating e-commerce websites using WooCommerce with the affected plugin, this vulnerability can lead to unauthorized deactivation of key merchandising and search filtering features. While it does not directly expose customer data or cause full service outages, the loss of plugin functionality can degrade user experience, reduce sales conversion rates, and damage brand reputation. Attackers with minimal privileges (Subscriber role) can exploit this flaw, which increases the risk from insider threats or compromised low-level accounts. In regulated sectors, such as retail and finance, disruption of e-commerce capabilities could have financial and compliance repercussions. The impact is primarily operational and reputational rather than data breach related. Organizations relying heavily on WooCommerce merchandising features should consider this vulnerability a moderate risk that could affect business continuity and customer satisfaction.
Mitigation Recommendations
Immediate mitigation steps include auditing user roles and permissions to ensure that Subscriber-level accounts are tightly controlled and monitored. Restrict access to the 'wcis_save_email' endpoint by implementing web application firewall (WAF) rules or custom access controls to block unauthorized requests. Disable or remove unused Subscriber accounts and enforce strong authentication policies to reduce risk from compromised accounts. Monitor plugin activity logs for unusual deactivation attempts. Since no official patch is currently available, organizations should prepare to apply updates promptly once released by the vendor. Additionally, consider isolating the WooCommerce environment or using plugin hardening tools that enforce capability checks. Regularly back up plugin configurations and site data to enable quick recovery if unauthorized changes occur. Engage with the plugin vendor or community to track patch releases and vulnerability disclosures.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-22T18:40:47.777Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6933c71c11163305efef3527
Added to database: 12/6/2025, 6:03:08 AM
Last enriched: 12/13/2025, 7:06:18 AM
Last updated: 2/4/2026, 7:21:43 AM
Views: 61
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-24447: Improper neutralization of formula elements in a CSV file in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-23704: Unrestricted upload of file with dangerous type in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-22875: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-21393: Cross-site scripting (XSS) in Six Apart Ltd. Movable Type (Software Edition)
MediumCVE-2026-1756: CWE-434 Unrestricted Upload of File with Dangerous Type in seezee WP FOFT Loader
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.