Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12115: CWE-602 Client-Side Enforcement of Server-Side Security in wpclever WPC Name Your Price for WooCommerce

0
High
VulnerabilityCVE-2025-12115cvecve-2025-12115cwe-602
Published: Fri Oct 31 2025 (10/31/2025, 09:27:21 UTC)
Source: CVE Database V5
Vendor/Project: wpclever
Product: WPC Name Your Price for WooCommerce

Description

The WPC Name Your Price for WooCommerce plugin for WordPress is vulnerable to unauthorized price alteration in all versions up to, and including, 2.1.9. This is due to the plugin not disabling the ability to name a custom price when it has been specifically disabled for a product. This makes it possible for unauthenticated attackers to purchase products at prices less than they should be able to.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:07:04 UTC

Technical Analysis

CVE-2025-12115 is a vulnerability identified in the WPC Name Your Price for WooCommerce plugin, a popular WordPress extension that allows customers to name their own price for products. The issue exists in all versions up to and including 2.1.9. The root cause is improper enforcement of server-side security controls, specifically a failure to disable the custom pricing feature on the client side when it has been disabled for a product on the server side. This is classified under CWE-602, which involves client-side enforcement of server-side security policies, leading to security bypass. Because the plugin relies on client-side controls to restrict price input, an unauthenticated attacker can manipulate the price parameter in requests to purchase products at prices lower than intended by the merchant. The vulnerability requires no authentication or user interaction and can be exploited remotely over the network. The CVSS v3.1 base score is 7.5, reflecting high severity due to the ease of exploitation and significant impact on data integrity (price manipulation). No known public exploits have been reported yet, and no patches or updates have been linked at the time of publication. The vulnerability primarily affects the integrity of e-commerce transactions, potentially resulting in financial losses and undermining trust in affected online stores.

Potential Impact

The primary impact of CVE-2025-12115 is financial loss due to unauthorized price manipulation, allowing attackers to purchase products at prices lower than intended. This undermines the integrity of e-commerce transactions and can lead to significant revenue loss for affected merchants. Additionally, widespread exploitation could damage the reputation of online stores using the vulnerable plugin, eroding customer trust. Since the vulnerability does not affect confidentiality or availability, data breaches or service outages are unlikely. However, the ease of exploitation without authentication or user interaction increases the risk of automated attacks and large-scale abuse. Organizations relying on WooCommerce with this plugin may face operational disruptions in pricing and inventory management due to fraudulent transactions. The vulnerability also poses compliance risks if financial controls are circumvented, potentially impacting regulatory adherence in some jurisdictions.

Mitigation Recommendations

To mitigate CVE-2025-12115, organizations should immediately verify if they are using the WPC Name Your Price for WooCommerce plugin version 2.1.9 or earlier and plan to upgrade to a patched version once available. In the absence of an official patch, merchants should implement strict server-side validation to enforce pricing rules, ensuring that any custom price input is validated against product settings before processing transactions. Disabling the plugin temporarily or removing the custom pricing feature for critical products can reduce exposure. Monitoring transaction logs for anomalous pricing patterns can help detect exploitation attempts. Additionally, applying Web Application Firewall (WAF) rules to block suspicious requests manipulating price parameters may provide interim protection. Merchants should also educate their development and security teams about the risks of relying on client-side controls for critical business logic and enforce secure coding practices that validate all inputs server-side.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-23T15:27:17.832Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690483ba189d660333d91771

Added to database: 10/31/2025, 9:39:06 AM

Last enriched: 2/27/2026, 8:07:04 PM

Last updated: 3/23/2026, 2:36:59 PM

Views: 214

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses