Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12881: CWE-639 Authorization Bypass Through User-Controlled Key in wpswings Return Refund and Exchange For WooCommerce

0
Medium
VulnerabilityCVE-2025-12881cvecve-2025-12881cwe-639
Published: Fri Nov 21 2025 (11/21/2025, 07:31:53 UTC)
Source: CVE Database V5
Vendor/Project: wpswings
Product: Return Refund and Exchange For WooCommerce

Description

The Return Refund and Exchange For WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.5.5 via the wps_rma_fetch_order_msgs() due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read other user's order messages.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:17:18 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12881 affects the Return Refund and Exchange For WooCommerce plugin, a popular WordPress extension used to manage returns, refunds, and exchanges in e-commerce stores. The root cause is an Insecure Direct Object Reference (IDOR) vulnerability classified under CWE-639, which arises from insufficient authorization checks on a user-supplied key parameter in the wps_rma_fetch_order_msgs() function. This function is responsible for fetching order-related messages, but it fails to validate whether the requesting user is authorized to access the messages of the specified order. As a result, any authenticated user with at least Subscriber-level privileges can manipulate the key parameter to retrieve messages from other users' orders. The vulnerability impacts all versions up to and including 4.5.5 of the plugin. Exploitation requires authentication but no further user interaction, and it can be performed remotely via network requests to the WordPress site. The CVSS v3.1 base score is 5.4, reflecting a medium severity due to the limited confidentiality impact and the requirement for authentication. No patches or mitigations have been officially released yet, and no active exploitation has been reported. The vulnerability highlights a common issue in WordPress plugins where access control is not rigorously enforced on user-supplied identifiers, potentially exposing sensitive customer data such as order details and communications.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of order messages, which may contain sensitive customer information such as order details, refund requests, and communication history. This breach of confidentiality can undermine customer trust and violate privacy regulations like GDPR or CCPA, potentially leading to legal and reputational consequences for affected organizations. Since the vulnerability requires only Subscriber-level access, attackers could leverage compromised or low-privilege accounts to escalate data exposure without needing administrative privileges. While the integrity and availability of the system are not directly affected, the exposure of private data can facilitate further attacks such as social engineering or targeted phishing campaigns. E-commerce businesses relying on WooCommerce and this plugin are at risk of customer data leakage, which could impact their operational security and compliance posture. The scope of affected systems includes any WordPress site using the vulnerable plugin version, which is widespread given WooCommerce's popularity. Organizations with large customer bases or handling sensitive transactions are particularly vulnerable to the consequences of this flaw.

Mitigation Recommendations

Until an official patch is released, organizations should implement several practical mitigations: 1) Restrict Subscriber-level user capabilities by reviewing and tightening user role permissions to minimize unnecessary access to order-related functions. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to manipulate the key parameter in wps_rma_fetch_order_msgs(). 3) Monitor logs for unusual access patterns or repeated attempts to access order messages beyond the user's own orders. 4) Consider temporarily disabling or replacing the Return Refund and Exchange For WooCommerce plugin if feasible, especially in high-risk environments. 5) Educate users and administrators about the risk of credential compromise, as attackers need authenticated access to exploit this vulnerability. 6) Follow vendor communications closely and apply patches immediately once available. 7) Conduct a thorough audit of access control mechanisms in custom or third-party WordPress plugins to prevent similar IDOR issues. These steps go beyond generic advice by focusing on role hardening, proactive detection, and temporary risk reduction until a fix is deployed.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-07T16:19:02.823Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6920235bcf2d47c38997b542

Added to database: 11/21/2025, 8:31:23 AM

Last enriched: 2/27/2026, 9:17:18 PM

Last updated: 3/24/2026, 7:15:53 AM

Views: 100

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses