Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12584: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in shapedplugin Quick View for WooCommerce

0
Medium
VulnerabilityCVE-2025-12584cvecve-2025-12584cwe-200
Published: Thu Nov 27 2025 (11/27/2025, 09:27:49 UTC)
Source: CVE Database V5
Vendor/Project: shapedplugin
Product: Quick View for WooCommerce

Description

The Quick View for WooCommerce plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.2.17 via the 'wqv_popup_content' AJAX endpoint due to insufficient restrictions on which products can be included. This makes it possible for unauthenticated attackers to extract data from private products that they should not have access to.

AI-Powered Analysis

AILast updated: 12/04/2025, 10:57:17 UTC

Technical Analysis

CVE-2025-12584 identifies an information exposure vulnerability in the Quick View for WooCommerce plugin for WordPress, specifically affecting versions up to and including 2.2.17. The vulnerability stems from insufficient restrictions on the 'wqv_popup_content' AJAX endpoint, which is designed to fetch product details for the Quick View feature. Due to improper access control, unauthenticated attackers can query this endpoint to retrieve data from private or restricted products that should not be publicly accessible. This exposure violates CWE-200, which concerns the exposure of sensitive information to unauthorized actors. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low complexity. The impact is limited to confidentiality loss, as attackers can read sensitive product data but cannot modify or disrupt service. No known exploits have been reported in the wild as of the publication date, but the vulnerability presents a clear risk to the confidentiality of e-commerce data. The CVSS v3.1 base score of 5.3 reflects the network attack vector, no privileges required, no user interaction, and limited confidentiality impact. The flaw affects all plugin versions up to 2.2.17, and no official patches or updates are currently linked, indicating the need for vigilance and interim mitigations.

Potential Impact

For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive product information, including pricing, inventory, or proprietary product details intended to be private. Such exposure can undermine competitive advantage, damage brand reputation, and potentially lead to regulatory scrutiny under data protection laws if customer-related data is involved. E-commerce businesses relying on WooCommerce with the affected plugin are particularly vulnerable, especially those with private or restricted product catalogs. While the vulnerability does not allow data modification or service disruption, the confidentiality breach alone can have significant commercial consequences. Additionally, attackers could leverage exposed information for further targeted attacks or social engineering. The risk is heightened in countries with a strong e-commerce presence and strict data protection regulations, where data leaks can lead to legal penalties and loss of customer trust.

Mitigation Recommendations

Organizations should monitor for official patches from shapedplugin and apply updates promptly once available. Until patches are released, practical mitigations include disabling the Quick View feature if not essential, or restricting access to the 'wqv_popup_content' AJAX endpoint via web application firewalls (WAF) or server-level access controls to authenticated users only. Implementing IP whitelisting or rate limiting on AJAX endpoints can reduce exposure. Reviewing and tightening WooCommerce product visibility settings and plugin configurations can help minimize data leakage. Security teams should audit logs for suspicious access patterns to the AJAX endpoint and educate developers and administrators about the risk. Regular vulnerability scanning and penetration testing focused on WordPress plugins can detect similar issues early. Finally, maintaining a robust incident response plan ensures readiness if exploitation attempts occur.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-31T21:58:43.201Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6928251f23c3d7b26904cfbb

Added to database: 11/27/2025, 10:17:03 AM

Last enriched: 12/4/2025, 10:57:17 AM

Last updated: 12/4/2025, 9:54:32 PM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats