Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12389: CWE-862 Missing Authorization in sidngr Import Export For WooCommerce

0
Medium
VulnerabilityCVE-2025-12389cvecve-2025-12389cwe-862
Published: Tue Nov 04 2025 (11/04/2025, 04:27:21 UTC)
Source: CVE Database V5
Vendor/Project: sidngr
Product: Import Export For WooCommerce

Description

The Import Export For WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_setting() function in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's record setting.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:27:37 UTC

Technical Analysis

CVE-2025-12389 is a vulnerability identified in the Import Export For WooCommerce plugin for WordPress, specifically in versions up to and including 1.6.2. The root cause is a missing authorization check in the update_setting() function, which is responsible for updating plugin configuration settings. This missing capability check means that any authenticated user with at least Subscriber-level access can modify the plugin's settings without proper permissions. The vulnerability is classified under CWE-862 (Missing Authorization). The attack vector is network-based (remote), requiring the attacker to be authenticated but not requiring any additional user interaction. The vulnerability impacts the integrity of the plugin's configuration data but does not affect confidentiality or availability. The CVSS v3.1 base score is 4.3 (medium), with vector AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N, indicating low attack complexity, low privileges required, and no user interaction needed. No patches or exploits are currently publicly available, but the vulnerability is published and should be addressed promptly. The plugin is widely used in WooCommerce installations, which powers many e-commerce sites on WordPress, making this a relevant concern for many organizations relying on this ecosystem.

Potential Impact

The primary impact of this vulnerability is unauthorized modification of the plugin's settings, which could lead to misconfiguration, potential disruption of import/export operations, or enabling further attacks if the altered settings weaken security controls. Since the vulnerability requires only Subscriber-level access, attackers who have gained low-level credentials (e.g., through phishing or weak passwords) can escalate their influence within the WordPress environment. Although confidentiality and availability are not directly affected, integrity compromise of plugin settings can indirectly lead to operational issues or facilitate further exploitation. For organizations running WooCommerce stores, this could result in data inconsistencies, business process disruptions, or reputational damage if attackers manipulate export/import data flows. The scope is limited to sites using this specific plugin, but given WooCommerce’s popularity, the number of affected sites could be substantial worldwide.

Mitigation Recommendations

1. Immediate mitigation involves updating the Import Export For WooCommerce plugin to a version where this vulnerability is fixed once available. Since no patch links are currently provided, monitor vendor announcements closely. 2. Restrict Subscriber-level user capabilities by reviewing and hardening WordPress user roles and permissions, ensuring that only trusted users have access to accounts with such privileges. 3. Implement strong authentication mechanisms such as multi-factor authentication (MFA) to reduce the risk of credential compromise. 4. Monitor plugin settings and configuration changes through WordPress audit logs or security plugins to detect unauthorized modifications promptly. 5. Consider temporarily disabling or restricting access to the plugin’s import/export features if they are not critical to operations until a patch is released. 6. Conduct regular security assessments and penetration testing focused on WordPress plugins and user privilege escalation paths. 7. Educate users on phishing risks and enforce strong password policies to minimize the risk of low-privilege account compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-28T13:13:22.814Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690984dd2b77ca42b4883ec5

Added to database: 11/4/2025, 4:45:17 AM

Last enriched: 2/27/2026, 8:27:37 PM

Last updated: 3/26/2026, 9:17:51 AM

Views: 106

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses