CVE-2025-12955: CWE-862 Missing Authorization in rajeshsingh520 Live sales notification for WooCommerce
The Live sales notification for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.39. This is due to the "getOrders" function lacking proper authorization and capability checks when the plugin is configured to display recent order information. This makes it possible for unauthenticated attackers to extract sensitive customer information including buyer first names, city, state, country, purchase time and date, and product details.
AI Analysis
Technical Summary
CVE-2025-12955 identifies a Missing Authorization vulnerability (CWE-862) in the Live sales notification for WooCommerce plugin for WordPress, affecting all versions up to and including 2.3.39. The vulnerability stems from the 'getOrders' function, which lacks proper authorization and capability checks when retrieving recent order information. This flaw allows unauthenticated attackers to remotely invoke the function and extract sensitive customer information, including buyer first names, city, state, country, purchase time and date, and product details. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS v3.1 base score is 7.5 (high), reflecting the high confidentiality impact but no impact on integrity or availability. Although no public exploits are currently known, the exposure of personal data can lead to privacy violations and compliance issues, especially under GDPR. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent in Europe. The lack of patch availability at the time of disclosure necessitates immediate mitigation steps to prevent data leakage. This vulnerability highlights the critical need for proper authorization checks in plugins handling sensitive customer data.
Potential Impact
For European organizations, this vulnerability poses a significant risk to customer privacy and data protection compliance. The unauthorized disclosure of personally identifiable information (PII) such as names, geographic locations, and purchase details can lead to breaches of the EU General Data Protection Regulation (GDPR), resulting in potential fines and legal consequences. Additionally, the exposure of purchase behavior and product details could be leveraged for targeted phishing or social engineering attacks. E-commerce businesses relying on WooCommerce with this plugin may suffer reputational damage and loss of customer trust if exploited. The vulnerability does not affect system integrity or availability directly but compromises confidentiality, which is critical for maintaining compliance and customer confidence. Given the ease of exploitation without authentication or user interaction, attackers can automate data harvesting at scale, increasing the potential impact. Organizations operating in highly regulated sectors or handling sensitive customer data are particularly vulnerable.
Mitigation Recommendations
1. Immediately disable the Live sales notification for WooCommerce plugin until a security patch is released by the vendor. 2. Monitor official vendor channels and WordPress plugin repositories for updates addressing CVE-2025-12955 and apply patches promptly. 3. Implement web application firewall (WAF) rules to restrict access to endpoints related to order data retrieval, especially the 'getOrders' function, allowing only authenticated and authorized users. 4. Conduct a thorough audit of all WooCommerce plugins to ensure proper authorization checks are in place for sensitive data access. 5. Limit exposure of order information on public-facing interfaces and avoid displaying detailed customer data without strict access controls. 6. Review and enhance logging and monitoring to detect unusual access patterns or data exfiltration attempts targeting order information. 7. Educate development and security teams on secure coding practices, emphasizing authorization validation in plugin development. 8. For organizations with compliance requirements, document mitigation steps and incident response plans related to this vulnerability. 9. Consider alternative plugins with verified security postures if immediate patching is not feasible. 10. Regularly back up website data and configurations to enable rapid recovery in case of compromise.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12955: CWE-862 Missing Authorization in rajeshsingh520 Live sales notification for WooCommerce
Description
The Live sales notification for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.39. This is due to the "getOrders" function lacking proper authorization and capability checks when the plugin is configured to display recent order information. This makes it possible for unauthenticated attackers to extract sensitive customer information including buyer first names, city, state, country, purchase time and date, and product details.
AI-Powered Analysis
Technical Analysis
CVE-2025-12955 identifies a Missing Authorization vulnerability (CWE-862) in the Live sales notification for WooCommerce plugin for WordPress, affecting all versions up to and including 2.3.39. The vulnerability stems from the 'getOrders' function, which lacks proper authorization and capability checks when retrieving recent order information. This flaw allows unauthenticated attackers to remotely invoke the function and extract sensitive customer information, including buyer first names, city, state, country, purchase time and date, and product details. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS v3.1 base score is 7.5 (high), reflecting the high confidentiality impact but no impact on integrity or availability. Although no public exploits are currently known, the exposure of personal data can lead to privacy violations and compliance issues, especially under GDPR. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent in Europe. The lack of patch availability at the time of disclosure necessitates immediate mitigation steps to prevent data leakage. This vulnerability highlights the critical need for proper authorization checks in plugins handling sensitive customer data.
Potential Impact
For European organizations, this vulnerability poses a significant risk to customer privacy and data protection compliance. The unauthorized disclosure of personally identifiable information (PII) such as names, geographic locations, and purchase details can lead to breaches of the EU General Data Protection Regulation (GDPR), resulting in potential fines and legal consequences. Additionally, the exposure of purchase behavior and product details could be leveraged for targeted phishing or social engineering attacks. E-commerce businesses relying on WooCommerce with this plugin may suffer reputational damage and loss of customer trust if exploited. The vulnerability does not affect system integrity or availability directly but compromises confidentiality, which is critical for maintaining compliance and customer confidence. Given the ease of exploitation without authentication or user interaction, attackers can automate data harvesting at scale, increasing the potential impact. Organizations operating in highly regulated sectors or handling sensitive customer data are particularly vulnerable.
Mitigation Recommendations
1. Immediately disable the Live sales notification for WooCommerce plugin until a security patch is released by the vendor. 2. Monitor official vendor channels and WordPress plugin repositories for updates addressing CVE-2025-12955 and apply patches promptly. 3. Implement web application firewall (WAF) rules to restrict access to endpoints related to order data retrieval, especially the 'getOrders' function, allowing only authenticated and authorized users. 4. Conduct a thorough audit of all WooCommerce plugins to ensure proper authorization checks are in place for sensitive data access. 5. Limit exposure of order information on public-facing interfaces and avoid displaying detailed customer data without strict access controls. 6. Review and enhance logging and monitoring to detect unusual access patterns or data exfiltration attempts targeting order information. 7. Educate development and security teams on secure coding practices, emphasizing authorization validation in plugin development. 8. For organizations with compliance requirements, document mitigation steps and incident response plans related to this vulnerability. 9. Consider alternative plugins with verified security postures if immediate patching is not feasible. 10. Regularly back up website data and configurations to enable rapid recovery in case of compromise.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-10T14:48:53.588Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691c3e32a312a743bb510ba3
Added to database: 11/18/2025, 9:36:50 AM
Last enriched: 11/18/2025, 9:52:17 AM
Last updated: 11/18/2025, 9:50:50 PM
Views: 11
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63228: n/a
CriticalCVE-2025-63225: n/a
CriticalCVE-2025-37163: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking Management Software (Airwave)
HighCVE-2025-37162: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking 100 Series Cellular Bridge
MediumCVE-2025-37161: Vulnerability in Hewlett Packard Enterprise (HPE) HPE Aruba Networking 100 Series Cellular Bridge
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.