CVE-2025-12809: CWE-862 Missing Authorization in wedevs Dokan Pro
The Dokan Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `/dokan/v1/wholesale/register` REST API endpoint in all versions up to, and including, 4.1.3. This makes it possible for unauthenticated attackers to enumerate users and retrieve their email addresses via the REST API by providing a user ID, along with other information such as usernames, display names, user roles, and registration dates.
AI Analysis
Technical Summary
CVE-2025-12809 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Dokan Pro plugin for WordPress, specifically affecting all versions up to 4.1.3. The issue arises due to the absence of a capability check on the REST API endpoint /dokan/v1/wholesale/register, which is intended for wholesale registration processes. This missing authorization allows unauthenticated attackers to query the API with a user ID and retrieve sensitive user information including email addresses, usernames, display names, user roles, and registration dates. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low complexity. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the limited impact on confidentiality (partial disclosure of user data) and no impact on integrity or availability. Although no public exploits have been reported, the exposure of personally identifiable information (PII) can facilitate further attacks such as phishing or social engineering. The vulnerability affects organizations using Dokan Pro for multi-vendor marketplaces or e-commerce platforms, which are common in WordPress environments. The lack of a patch at the time of reporting necessitates immediate mitigation efforts to prevent unauthorized data disclosure. The vulnerability was publicly disclosed on December 16, 2025, with Wordfence as the assigner. Given the widespread use of WordPress and Dokan Pro in Europe, this vulnerability poses a tangible risk to user privacy and regulatory compliance.
Potential Impact
For European organizations, the primary impact of CVE-2025-12809 is the unauthorized disclosure of user data, including email addresses and other personal identifiers, which can lead to privacy violations and undermine customer trust. This exposure can facilitate targeted phishing campaigns, identity theft, and social engineering attacks. Organizations subject to the EU General Data Protection Regulation (GDPR) may face legal and financial repercussions due to inadequate protection of personal data. The vulnerability does not affect system integrity or availability directly but compromises confidentiality, which is critical for maintaining compliance and reputation. E-commerce platforms and marketplaces relying on Dokan Pro are particularly vulnerable, as they manage large volumes of user data. The ease of exploitation without authentication increases the risk of mass data harvesting by attackers. Additionally, the exposure of user roles and registration dates can aid attackers in crafting more convincing attacks or privilege escalation attempts. Overall, the vulnerability threatens data privacy and regulatory compliance for European entities using the affected plugin.
Mitigation Recommendations
1. Immediately restrict access to the /dokan/v1/wholesale/register REST API endpoint by implementing web application firewall (WAF) rules or server-level access controls to block unauthenticated requests. 2. Apply custom authorization checks within the WordPress environment to ensure that only authenticated and authorized users can access the vulnerable endpoint. 3. Monitor API logs for unusual or repeated access patterns targeting the wholesale registration endpoint to detect potential exploitation attempts. 4. Disable or limit the use of the Dokan Pro wholesale registration feature if it is not essential to business operations. 5. Regularly update the Dokan Pro plugin as soon as the vendor releases a security patch addressing this vulnerability. 6. Conduct a thorough audit of user data exposure and notify affected users if a data breach is suspected, in compliance with GDPR requirements. 7. Educate administrators and developers about secure API design and the importance of capability checks on REST endpoints. 8. Employ network segmentation and least privilege principles to minimize the exposure of critical systems and data.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12809: CWE-862 Missing Authorization in wedevs Dokan Pro
Description
The Dokan Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `/dokan/v1/wholesale/register` REST API endpoint in all versions up to, and including, 4.1.3. This makes it possible for unauthenticated attackers to enumerate users and retrieve their email addresses via the REST API by providing a user ID, along with other information such as usernames, display names, user roles, and registration dates.
AI-Powered Analysis
Technical Analysis
CVE-2025-12809 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Dokan Pro plugin for WordPress, specifically affecting all versions up to 4.1.3. The issue arises due to the absence of a capability check on the REST API endpoint /dokan/v1/wholesale/register, which is intended for wholesale registration processes. This missing authorization allows unauthenticated attackers to query the API with a user ID and retrieve sensitive user information including email addresses, usernames, display names, user roles, and registration dates. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network with low complexity. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the limited impact on confidentiality (partial disclosure of user data) and no impact on integrity or availability. Although no public exploits have been reported, the exposure of personally identifiable information (PII) can facilitate further attacks such as phishing or social engineering. The vulnerability affects organizations using Dokan Pro for multi-vendor marketplaces or e-commerce platforms, which are common in WordPress environments. The lack of a patch at the time of reporting necessitates immediate mitigation efforts to prevent unauthorized data disclosure. The vulnerability was publicly disclosed on December 16, 2025, with Wordfence as the assigner. Given the widespread use of WordPress and Dokan Pro in Europe, this vulnerability poses a tangible risk to user privacy and regulatory compliance.
Potential Impact
For European organizations, the primary impact of CVE-2025-12809 is the unauthorized disclosure of user data, including email addresses and other personal identifiers, which can lead to privacy violations and undermine customer trust. This exposure can facilitate targeted phishing campaigns, identity theft, and social engineering attacks. Organizations subject to the EU General Data Protection Regulation (GDPR) may face legal and financial repercussions due to inadequate protection of personal data. The vulnerability does not affect system integrity or availability directly but compromises confidentiality, which is critical for maintaining compliance and reputation. E-commerce platforms and marketplaces relying on Dokan Pro are particularly vulnerable, as they manage large volumes of user data. The ease of exploitation without authentication increases the risk of mass data harvesting by attackers. Additionally, the exposure of user roles and registration dates can aid attackers in crafting more convincing attacks or privilege escalation attempts. Overall, the vulnerability threatens data privacy and regulatory compliance for European entities using the affected plugin.
Mitigation Recommendations
1. Immediately restrict access to the /dokan/v1/wholesale/register REST API endpoint by implementing web application firewall (WAF) rules or server-level access controls to block unauthenticated requests. 2. Apply custom authorization checks within the WordPress environment to ensure that only authenticated and authorized users can access the vulnerable endpoint. 3. Monitor API logs for unusual or repeated access patterns targeting the wholesale registration endpoint to detect potential exploitation attempts. 4. Disable or limit the use of the Dokan Pro wholesale registration feature if it is not essential to business operations. 5. Regularly update the Dokan Pro plugin as soon as the vendor releases a security patch addressing this vulnerability. 6. Conduct a thorough audit of user data exposure and notify affected users if a data breach is suspected, in compliance with GDPR requirements. 7. Educate administrators and developers about secure API design and the importance of capability checks on REST endpoints. 8. Employ network segmentation and least privilege principles to minimize the exposure of critical systems and data.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-06T16:12:03.255Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6940f308a4f72ecfca032936
Added to database: 12/16/2025, 5:50:00 AM
Last enriched: 12/23/2025, 7:13:57 AM
Last updated: 2/6/2026, 6:18:51 AM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0598: Unverified Ownership in Red Hat Red Hat Ansible Automation Platform 2
MediumCVE-2026-1991: NULL Pointer Dereference in libuvc
MediumCVE-2026-1990: NULL Pointer Dereference in oatpp
MediumCVE-2026-1979: Use After Free in mruby
MediumCVE-2026-1978: Direct Request in kalyan02 NanoCMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.