Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12783: CWE-862 Missing Authorization in premmerce Premmerce Brands for WooCommerce

0
Medium
VulnerabilityCVE-2025-12783cvecve-2025-12783cwe-862
Published: Fri Dec 12 2025 (12/12/2025, 03:20:47 UTC)
Source: CVE Database V5
Vendor/Project: premmerce
Product: Premmerce Brands for WooCommerce

Description

The Premmerce Brands for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the saveBrandsSettings function in all versions up to, and including, 1.2.13. This makes it possible for authenticated attackers, with Subscriber-level access and above, to modify brand permalink settings.

AI-Powered Analysis

AILast updated: 12/12/2025, 04:08:12 UTC

Technical Analysis

CVE-2025-12783 identifies a missing authorization vulnerability (CWE-862) in the Premmerce Brands for WooCommerce plugin for WordPress, specifically in the saveBrandsSettings function. This function lacks proper capability checks, allowing any authenticated user with at least Subscriber-level privileges to modify brand permalink settings. Since WooCommerce is a widely used e-commerce platform and Premmerce Brands is a popular plugin for managing brand taxonomies, this vulnerability can be exploited remotely without user interaction. The attacker does not need elevated privileges beyond Subscriber, which is a low-level role typically assigned to customers or basic users. The vulnerability impacts data integrity by enabling unauthorized modification of brand URLs, which could lead to SEO manipulation, brand impersonation, or redirect attacks. The CVSS 3.1 base score is 4.3 (medium), reflecting the low complexity of exploitation but limited impact on confidentiality and availability. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The issue affects all versions up to 1.2.13, and organizations using this plugin should audit user roles and consider temporary mitigations.

Potential Impact

For European organizations, especially those operating e-commerce sites using WooCommerce with the Premmerce Brands plugin, this vulnerability poses a risk to the integrity of brand-related data. Unauthorized modification of brand permalink settings can disrupt SEO rankings, mislead customers, and potentially facilitate phishing or redirect attacks by altering URLs. While the vulnerability does not directly expose sensitive data or cause service outages, the reputational damage and potential loss of customer trust can be significant. Attackers with Subscriber-level access, which is commonly granted to registered users or customers, can exploit this flaw without needing administrative credentials, increasing the attack surface. This is particularly impactful for mid-sized and large retailers in Europe that rely heavily on brand identity and online presence. The absence of known exploits reduces immediate risk, but the public disclosure increases the likelihood of future exploitation attempts.

Mitigation Recommendations

European organizations should implement the following specific mitigations: 1) Immediately audit and restrict Subscriber-level permissions to the minimum necessary, ensuring that only trusted users have such access. 2) Employ custom code or security plugins to enforce capability checks on the saveBrandsSettings function or disable the Premmerce Brands plugin temporarily if brand permalink changes are not critical. 3) Monitor logs and change histories for unexpected modifications to brand permalink settings to detect potential exploitation attempts early. 4) Keep WordPress core, WooCommerce, and all plugins updated, and watch for official patches from Premmerce addressing this vulnerability. 5) Consider implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious requests targeting brand settings endpoints. 6) Educate site administrators and users about the risk of unauthorized changes and encourage strong authentication practices to reduce compromised accounts. 7) If feasible, isolate brand management functions to higher privilege roles until a patch is available.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-05T22:32:16.722Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b9182650da22753edbad7

Added to database: 12/12/2025, 3:52:34 AM

Last enriched: 12/12/2025, 4:08:12 AM

Last updated: 12/14/2025, 8:46:34 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats