CVE-2025-12133: CWE-862 Missing Authorization in paulepro2019 EPROLO Dropshipping
The EPROLO Dropshipping plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wp_ajax_eprolo_delete_tracking and wp_ajax_eprolo_save_tracking_data AJAX endpoints in all versions up to, and including, 2.3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify and delete tracking data.
AI Analysis
Technical Summary
CVE-2025-12133 is a vulnerability identified in the EPROLO Dropshipping plugin for WordPress, maintained by paulepro2019. The flaw is categorized under CWE-862 (Missing Authorization) and affects all versions up to and including 2.3.1. Specifically, the vulnerability exists because the plugin fails to perform proper capability checks on two AJAX endpoints: wp_ajax_eprolo_delete_tracking and wp_ajax_eprolo_save_tracking_data. These endpoints handle requests to delete and save tracking data related to dropshipping orders. Due to the missing authorization, any authenticated user with at least Subscriber-level privileges can invoke these endpoints to modify or delete tracking information without appropriate permissions. This can lead to unauthorized data tampering within the plugin’s tracking system. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity and limited impact on confidentiality and availability but a direct impact on data integrity. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on October 23, 2025, and published on December 5, 2025. Given the widespread use of WordPress and the popularity of dropshipping plugins, this vulnerability poses a moderate risk to e-commerce sites using EPROLO Dropshipping.
Potential Impact
The primary impact of CVE-2025-12133 is unauthorized modification and deletion of tracking data within the EPROLO Dropshipping plugin. This compromises the integrity of order tracking information, potentially leading to operational disruptions, customer dissatisfaction, and loss of trust. While confidentiality and availability are not directly affected, inaccurate or missing tracking data can cause shipment errors, disputes, and financial losses. Attackers with Subscriber-level access, which is a low-privilege role, can exploit this vulnerability, increasing the risk from insider threats or compromised low-level accounts. Organizations relying on this plugin for order fulfillment and customer communication may experience degraded service quality and reputational damage. The vulnerability could also be leveraged as part of a broader attack chain to manipulate order processing or cover fraudulent activities. Although no exploits are known in the wild, the ease of exploitation and the low privilege required make timely mitigation important for affected sites worldwide.
Mitigation Recommendations
To mitigate CVE-2025-12133, organizations should first verify if they are using the EPROLO Dropshipping plugin version 2.3.1 or earlier. Immediate steps include restricting access to the affected AJAX endpoints by implementing custom capability checks or access controls at the web server or application firewall level. Administrators can also temporarily disable the plugin if feasible until a vendor patch is released. Monitoring logs for unusual activity on wp_ajax_eprolo_delete_tracking and wp_ajax_eprolo_save_tracking_data endpoints can help detect exploitation attempts. It is critical to enforce strong authentication and limit Subscriber-level account creation or usage, as these accounts can exploit the vulnerability. Organizations should subscribe to vendor updates and apply official patches promptly once available. Additionally, conducting regular security audits of WordPress plugins and minimizing the number of installed plugins reduces the attack surface. Employing a Web Application Firewall (WAF) with custom rules to block unauthorized AJAX requests targeting these endpoints can provide an effective interim defense.
Affected Countries
United States, United Kingdom, Canada, Australia, Germany, France, Netherlands, India, Brazil, Japan
CVE-2025-12133: CWE-862 Missing Authorization in paulepro2019 EPROLO Dropshipping
Description
The EPROLO Dropshipping plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the wp_ajax_eprolo_delete_tracking and wp_ajax_eprolo_save_tracking_data AJAX endpoints in all versions up to, and including, 2.3.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify and delete tracking data.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-12133 is a vulnerability identified in the EPROLO Dropshipping plugin for WordPress, maintained by paulepro2019. The flaw is categorized under CWE-862 (Missing Authorization) and affects all versions up to and including 2.3.1. Specifically, the vulnerability exists because the plugin fails to perform proper capability checks on two AJAX endpoints: wp_ajax_eprolo_delete_tracking and wp_ajax_eprolo_save_tracking_data. These endpoints handle requests to delete and save tracking data related to dropshipping orders. Due to the missing authorization, any authenticated user with at least Subscriber-level privileges can invoke these endpoints to modify or delete tracking information without appropriate permissions. This can lead to unauthorized data tampering within the plugin’s tracking system. The vulnerability does not require user interaction beyond authentication and can be exploited remotely over the network. The CVSS v3.1 base score is 4.3 (medium), reflecting low complexity and limited impact on confidentiality and availability but a direct impact on data integrity. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on October 23, 2025, and published on December 5, 2025. Given the widespread use of WordPress and the popularity of dropshipping plugins, this vulnerability poses a moderate risk to e-commerce sites using EPROLO Dropshipping.
Potential Impact
The primary impact of CVE-2025-12133 is unauthorized modification and deletion of tracking data within the EPROLO Dropshipping plugin. This compromises the integrity of order tracking information, potentially leading to operational disruptions, customer dissatisfaction, and loss of trust. While confidentiality and availability are not directly affected, inaccurate or missing tracking data can cause shipment errors, disputes, and financial losses. Attackers with Subscriber-level access, which is a low-privilege role, can exploit this vulnerability, increasing the risk from insider threats or compromised low-level accounts. Organizations relying on this plugin for order fulfillment and customer communication may experience degraded service quality and reputational damage. The vulnerability could also be leveraged as part of a broader attack chain to manipulate order processing or cover fraudulent activities. Although no exploits are known in the wild, the ease of exploitation and the low privilege required make timely mitigation important for affected sites worldwide.
Mitigation Recommendations
To mitigate CVE-2025-12133, organizations should first verify if they are using the EPROLO Dropshipping plugin version 2.3.1 or earlier. Immediate steps include restricting access to the affected AJAX endpoints by implementing custom capability checks or access controls at the web server or application firewall level. Administrators can also temporarily disable the plugin if feasible until a vendor patch is released. Monitoring logs for unusual activity on wp_ajax_eprolo_delete_tracking and wp_ajax_eprolo_save_tracking_data endpoints can help detect exploitation attempts. It is critical to enforce strong authentication and limit Subscriber-level account creation or usage, as these accounts can exploit the vulnerability. Organizations should subscribe to vendor updates and apply official patches promptly once available. Additionally, conducting regular security audits of WordPress plugins and minimizing the number of installed plugins reduces the attack surface. Employing a Web Application Firewall (WAF) with custom rules to block unauthorized AJAX requests targeting these endpoints can provide an effective interim defense.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-10-23T19:20:51.823Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69327172f88dbe026c779909
Added to database: 12/5/2025, 5:45:22 AM
Last enriched: 2/27/2026, 8:10:00 PM
Last updated: 3/26/2026, 3:52:08 AM
Views: 54
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.