Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12955: CWE-862 Missing Authorization in rajeshsingh520 Live sales notification for WooCommerce

0
High
VulnerabilityCVE-2025-12955cvecve-2025-12955cwe-862
Published: Tue Nov 18 2025 (11/18/2025, 09:27:36 UTC)
Source: CVE Database V5
Vendor/Project: rajeshsingh520
Product: Live sales notification for WooCommerce

Description

The Live sales notification for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.39. This is due to the "getOrders" function lacking proper authorization and capability checks when the plugin is configured to display recent order information. This makes it possible for unauthenticated attackers to extract sensitive customer information including buyer first names, city, state, country, purchase time and date, and product details.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 21:21:53 UTC

Technical Analysis

The Live sales notification for WooCommerce plugin, developed by rajeshsingh520, suffers from a Missing Authorization vulnerability (CWE-862) identified as CVE-2025-12955. This vulnerability exists in all versions up to and including 2.3.39. The root cause is the lack of proper authorization and capability checks in the getOrders function, which is responsible for retrieving recent order information to display live sales notifications. Because of this missing authorization, unauthenticated attackers can invoke this function remotely without any credentials or user interaction. This allows them to extract sensitive customer information including buyer first names, city, state, country, purchase date and time, and product details. The vulnerability affects the confidentiality of customer data but does not impact data integrity or availability. The CVSS v3.1 base score is 7.5, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and high confidentiality impact. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date (November 18, 2025). The plugin is widely used in WooCommerce-based WordPress e-commerce sites, making the vulnerability relevant to many online retailers globally.

Potential Impact

The primary impact of CVE-2025-12955 is the unauthorized disclosure of sensitive customer information, which can lead to privacy violations, regulatory non-compliance (e.g., GDPR, CCPA), and reputational damage for affected organizations. Attackers can harvest personally identifiable information (PII) such as buyer names and geographic locations, as well as purchase behavior and product preferences, which could be leveraged for targeted phishing, fraud, or competitive intelligence. Although the vulnerability does not allow modification or deletion of data, the exposure of confidential customer data alone is significant for e-commerce businesses. Organizations may face legal liabilities and loss of customer trust if exploited. Given the ease of exploitation (no authentication or user interaction required), the vulnerability is particularly dangerous for publicly accessible WooCommerce sites using the affected plugin versions.

Mitigation Recommendations

1. Immediate mitigation involves updating the Live sales notification for WooCommerce plugin to a fixed version once released by the vendor. Monitor vendor communications for patch announcements. 2. If no patch is available, disable or uninstall the plugin to eliminate the attack surface. 3. Implement web application firewall (WAF) rules to restrict access to the getOrders endpoint or related AJAX calls, allowing only authorized users or IP ranges. 4. Conduct a thorough audit of customer data access logs to detect any suspicious activity related to this vulnerability. 5. Limit the exposure of sensitive order information in live sales notifications or configure the plugin to display only non-sensitive data. 6. Employ principle of least privilege on WordPress roles and capabilities to reduce potential impact. 7. Educate site administrators about the risk and encourage regular plugin updates and security monitoring. 8. Consider additional network segmentation or access controls for backend systems hosting WooCommerce sites.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-10T14:48:53.588Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c3e32a312a743bb510ba3

Added to database: 11/18/2025, 9:36:50 AM

Last enriched: 2/27/2026, 9:21:53 PM

Last updated: 3/25/2026, 5:44:48 AM

Views: 180

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses