Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12955: CWE-862 Missing Authorization in rajeshsingh520 Live sales notification for WooCommerce

0
High
VulnerabilityCVE-2025-12955cvecve-2025-12955cwe-862
Published: Tue Nov 18 2025 (11/18/2025, 09:27:36 UTC)
Source: CVE Database V5
Vendor/Project: rajeshsingh520
Product: Live sales notification for WooCommerce

Description

The Live sales notification for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.39. This is due to the "getOrders" function lacking proper authorization and capability checks when the plugin is configured to display recent order information. This makes it possible for unauthenticated attackers to extract sensitive customer information including buyer first names, city, state, country, purchase time and date, and product details.

AI-Powered Analysis

AILast updated: 11/25/2025, 11:11:56 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12955 affects the Live sales notification for WooCommerce plugin, a WordPress extension used to display recent order notifications on e-commerce sites. The root cause is a missing authorization check (CWE-862) in the 'getOrders' function, which is responsible for retrieving recent order data. This function fails to verify whether the requester has the necessary permissions or capabilities before returning order details. Consequently, an unauthenticated attacker can remotely invoke this function and extract sensitive customer information including first names, city, state, country, purchase date and time, and product details. The vulnerability affects all plugin versions up to and including 2.3.39. The CVSS 3.1 base score is 7.5, indicating high severity, with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, meaning the attack can be performed remotely without privileges or user interaction, impacting confidentiality only. No integrity or availability impact is noted. No public exploit code is currently known, but the ease of exploitation and sensitive data exposure make this a critical privacy concern. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent in Europe. The lack of patch links suggests a fix is pending or not yet publicly available. Organizations relying on this plugin should consider immediate mitigation steps to prevent data leakage and comply with GDPR and other privacy regulations.

Potential Impact

The primary impact of CVE-2025-12955 is the unauthorized disclosure of sensitive customer information, including personally identifiable information (PII) such as buyer names and geographic locations, as well as purchase details. For European organizations, this data exposure can lead to significant privacy violations under the General Data Protection Regulation (GDPR), potentially resulting in regulatory fines and reputational damage. The confidentiality breach could also facilitate targeted phishing or social engineering attacks against customers. Although the vulnerability does not affect data integrity or availability, the loss of customer trust and legal consequences can be severe. E-commerce businesses using WooCommerce with this vulnerable plugin risk exposing their customer base to data theft. The ease of exploitation without authentication or user interaction increases the likelihood of automated scanning and data harvesting by malicious actors. This threat is particularly critical for organizations handling large volumes of customer transactions and sensitive order information.

Mitigation Recommendations

1. Immediate action should be to identify all WordPress installations using the Live sales notification for WooCommerce plugin and determine the version in use. 2. Monitor the plugin vendor’s official channels for the release of a security patch addressing CVE-2025-12955 and apply it promptly once available. 3. Until a patch is released, implement web application firewall (WAF) rules to block or restrict access to the vulnerable 'getOrders' API endpoint or related AJAX calls. 4. Restrict access to the plugin’s functionality by limiting it to authenticated and authorized users only, possibly by customizing the plugin code or using access control plugins. 5. Conduct a thorough audit of exposed customer data to assess potential leakage and notify affected individuals if required under GDPR. 6. Enhance monitoring and logging to detect unusual access patterns to the plugin endpoints. 7. Educate site administrators about the risks of installing plugins without proper security vetting and encourage regular updates. 8. Consider disabling or removing the plugin if it is not essential to business operations until a secure version is available.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-10T14:48:53.588Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c3e32a312a743bb510ba3

Added to database: 11/18/2025, 9:36:50 AM

Last enriched: 11/25/2025, 11:11:56 AM

Last updated: 1/7/2026, 8:46:38 AM

Views: 135

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats