CVE-2025-12955: CWE-862 Missing Authorization in rajeshsingh520 Live sales notification for WooCommerce
The Live sales notification for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.39. This is due to the "getOrders" function lacking proper authorization and capability checks when the plugin is configured to display recent order information. This makes it possible for unauthenticated attackers to extract sensitive customer information including buyer first names, city, state, country, purchase time and date, and product details.
AI Analysis
Technical Summary
The Live sales notification for WooCommerce plugin, developed by rajeshsingh520, suffers from a Missing Authorization vulnerability (CWE-862) identified as CVE-2025-12955. This vulnerability exists in all versions up to and including 2.3.39. The root cause is the lack of proper authorization and capability checks in the getOrders function, which is responsible for retrieving recent order information to display live sales notifications. Because of this missing authorization, unauthenticated attackers can invoke this function remotely without any credentials or user interaction. This allows them to extract sensitive customer information including buyer first names, city, state, country, purchase date and time, and product details. The vulnerability affects the confidentiality of customer data but does not impact data integrity or availability. The CVSS v3.1 base score is 7.5, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and high confidentiality impact. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date (November 18, 2025). The plugin is widely used in WooCommerce-based WordPress e-commerce sites, making the vulnerability relevant to many online retailers globally.
Potential Impact
The primary impact of CVE-2025-12955 is the unauthorized disclosure of sensitive customer information, which can lead to privacy violations, regulatory non-compliance (e.g., GDPR, CCPA), and reputational damage for affected organizations. Attackers can harvest personally identifiable information (PII) such as buyer names and geographic locations, as well as purchase behavior and product preferences, which could be leveraged for targeted phishing, fraud, or competitive intelligence. Although the vulnerability does not allow modification or deletion of data, the exposure of confidential customer data alone is significant for e-commerce businesses. Organizations may face legal liabilities and loss of customer trust if exploited. Given the ease of exploitation (no authentication or user interaction required), the vulnerability is particularly dangerous for publicly accessible WooCommerce sites using the affected plugin versions.
Mitigation Recommendations
1. Immediate mitigation involves updating the Live sales notification for WooCommerce plugin to a fixed version once released by the vendor. Monitor vendor communications for patch announcements. 2. If no patch is available, disable or uninstall the plugin to eliminate the attack surface. 3. Implement web application firewall (WAF) rules to restrict access to the getOrders endpoint or related AJAX calls, allowing only authorized users or IP ranges. 4. Conduct a thorough audit of customer data access logs to detect any suspicious activity related to this vulnerability. 5. Limit the exposure of sensitive order information in live sales notifications or configure the plugin to display only non-sensitive data. 6. Employ principle of least privilege on WordPress roles and capabilities to reduce potential impact. 7. Educate site administrators about the risk and encourage regular plugin updates and security monitoring. 8. Consider additional network segmentation or access controls for backend systems hosting WooCommerce sites.
Affected Countries
United States, United Kingdom, Germany, Australia, Canada, India, France, Netherlands, Brazil, Japan
CVE-2025-12955: CWE-862 Missing Authorization in rajeshsingh520 Live sales notification for WooCommerce
Description
The Live sales notification for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.39. This is due to the "getOrders" function lacking proper authorization and capability checks when the plugin is configured to display recent order information. This makes it possible for unauthenticated attackers to extract sensitive customer information including buyer first names, city, state, country, purchase time and date, and product details.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The Live sales notification for WooCommerce plugin, developed by rajeshsingh520, suffers from a Missing Authorization vulnerability (CWE-862) identified as CVE-2025-12955. This vulnerability exists in all versions up to and including 2.3.39. The root cause is the lack of proper authorization and capability checks in the getOrders function, which is responsible for retrieving recent order information to display live sales notifications. Because of this missing authorization, unauthenticated attackers can invoke this function remotely without any credentials or user interaction. This allows them to extract sensitive customer information including buyer first names, city, state, country, purchase date and time, and product details. The vulnerability affects the confidentiality of customer data but does not impact data integrity or availability. The CVSS v3.1 base score is 7.5, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, and high confidentiality impact. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date (November 18, 2025). The plugin is widely used in WooCommerce-based WordPress e-commerce sites, making the vulnerability relevant to many online retailers globally.
Potential Impact
The primary impact of CVE-2025-12955 is the unauthorized disclosure of sensitive customer information, which can lead to privacy violations, regulatory non-compliance (e.g., GDPR, CCPA), and reputational damage for affected organizations. Attackers can harvest personally identifiable information (PII) such as buyer names and geographic locations, as well as purchase behavior and product preferences, which could be leveraged for targeted phishing, fraud, or competitive intelligence. Although the vulnerability does not allow modification or deletion of data, the exposure of confidential customer data alone is significant for e-commerce businesses. Organizations may face legal liabilities and loss of customer trust if exploited. Given the ease of exploitation (no authentication or user interaction required), the vulnerability is particularly dangerous for publicly accessible WooCommerce sites using the affected plugin versions.
Mitigation Recommendations
1. Immediate mitigation involves updating the Live sales notification for WooCommerce plugin to a fixed version once released by the vendor. Monitor vendor communications for patch announcements. 2. If no patch is available, disable or uninstall the plugin to eliminate the attack surface. 3. Implement web application firewall (WAF) rules to restrict access to the getOrders endpoint or related AJAX calls, allowing only authorized users or IP ranges. 4. Conduct a thorough audit of customer data access logs to detect any suspicious activity related to this vulnerability. 5. Limit the exposure of sensitive order information in live sales notifications or configure the plugin to display only non-sensitive data. 6. Employ principle of least privilege on WordPress roles and capabilities to reduce potential impact. 7. Educate site administrators about the risk and encourage regular plugin updates and security monitoring. 8. Consider additional network segmentation or access controls for backend systems hosting WooCommerce sites.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-10T14:48:53.588Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 691c3e32a312a743bb510ba3
Added to database: 11/18/2025, 9:36:50 AM
Last enriched: 2/27/2026, 9:21:53 PM
Last updated: 3/25/2026, 5:44:48 AM
Views: 180
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.