Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12783: CWE-862 Missing Authorization in premmerce Premmerce Brands for WooCommerce

0
Medium
VulnerabilityCVE-2025-12783cvecve-2025-12783cwe-862
Published: Fri Dec 12 2025 (12/12/2025, 03:20:47 UTC)
Source: CVE Database V5
Vendor/Project: premmerce
Product: Premmerce Brands for WooCommerce

Description

The Premmerce Brands for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the saveBrandsSettings function in all versions up to, and including, 1.2.13. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify brand permalink settings.

AI-Powered Analysis

AILast updated: 12/19/2025, 05:06:24 UTC

Technical Analysis

CVE-2025-12783 is a vulnerability identified in the Premmerce Brands for WooCommerce plugin for WordPress, affecting all versions up to and including 1.2.13. The core issue is a missing authorization check (CWE-862) in the saveBrandsSettings function, which is responsible for saving brand permalink settings. This missing capability check allows any authenticated user with at least Subscriber-level access to modify these settings without proper permission validation. Since WordPress Subscriber roles are typically low-privilege users, this vulnerability effectively elevates their ability to alter brand permalink configurations, which could impact the integrity of website data and SEO structures. The vulnerability has a CVSS 3.1 base score of 4.3, indicating a medium severity level. The attack vector is network-based (remote), with low attack complexity, requiring privileges but no user interaction. The scope remains unchanged, and the impact affects integrity only, with no confidentiality or availability impact. No known exploits have been reported in the wild as of the publication date. The vulnerability was reserved on November 5, 2025, and published on December 12, 2025. The lack of patch links suggests that a fix may not yet be publicly available, emphasizing the need for cautious user role management and monitoring.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the integrity of e-commerce websites using WooCommerce with the Premmerce Brands plugin. Unauthorized modification of brand permalink settings could lead to SEO degradation, broken links, or misrepresentation of brand information, potentially harming brand reputation and customer trust. While it does not directly compromise sensitive data or availability, the ability for low-privilege users to alter site configurations could be leveraged in broader attack chains or social engineering scenarios. Organizations with large e-commerce platforms or those relying heavily on brand visibility online are particularly vulnerable. The medium severity indicates that while the risk is not critical, it should not be ignored, especially in regulated industries or where brand integrity is paramount. The absence of known exploits reduces immediate risk but does not eliminate the threat of future attacks.

Mitigation Recommendations

1. Immediately review and restrict user roles and permissions within WordPress, ensuring that Subscriber-level users do not have unnecessary access to plugin settings. 2. Monitor and audit changes to brand permalink settings and related configurations to detect unauthorized modifications promptly. 3. Implement a Web Application Firewall (WAF) with custom rules to detect and block unauthorized attempts to access or modify plugin settings endpoints. 4. Stay informed about updates from Premmerce and apply security patches as soon as they are released. 5. Consider temporarily disabling the Premmerce Brands plugin if the risk is deemed unacceptable and no patch is available. 6. Employ multi-factor authentication (MFA) for all authenticated users to reduce the risk of compromised accounts being used to exploit this vulnerability. 7. Conduct regular security assessments and penetration tests focusing on WordPress plugins and user privilege escalations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-05T22:32:16.722Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b9182650da22753edbad7

Added to database: 12/12/2025, 3:52:34 AM

Last enriched: 12/19/2025, 5:06:24 AM

Last updated: 2/7/2026, 8:58:32 AM

Views: 34

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats