Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12955: CWE-862 Missing Authorization in rajeshsingh520 Live sales notification for WooCommerce

0
High
VulnerabilityCVE-2025-12955cvecve-2025-12955cwe-862
Published: Tue Nov 18 2025 (11/18/2025, 09:27:36 UTC)
Source: CVE Database V5
Vendor/Project: rajeshsingh520
Product: Live sales notification for WooCommerce

Description

The Live sales notification for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.39. This is due to the "getOrders" function lacking proper authorization and capability checks when the plugin is configured to display recent order information. This makes it possible for unauthenticated attackers to extract sensitive customer information including buyer first names, city, state, country, purchase time and date, and product details.

AI-Powered Analysis

AILast updated: 11/18/2025, 09:52:17 UTC

Technical Analysis

CVE-2025-12955 identifies a Missing Authorization vulnerability (CWE-862) in the Live sales notification for WooCommerce plugin for WordPress, affecting all versions up to and including 2.3.39. The vulnerability stems from the 'getOrders' function, which lacks proper authorization and capability checks when retrieving recent order information. This flaw allows unauthenticated attackers to remotely invoke the function and extract sensitive customer information, including buyer first names, city, state, country, purchase time and date, and product details. The vulnerability does not require any privileges or user interaction, making it remotely exploitable over the network with low attack complexity. The CVSS v3.1 base score is 7.5 (high), reflecting the high confidentiality impact but no impact on integrity or availability. Although no public exploits are currently known, the exposure of personal data can lead to privacy violations and compliance issues, especially under GDPR. The plugin is widely used in WooCommerce-based e-commerce sites, which are prevalent in Europe. The lack of patch availability at the time of disclosure necessitates immediate mitigation steps to prevent data leakage. This vulnerability highlights the critical need for proper authorization checks in plugins handling sensitive customer data.

Potential Impact

For European organizations, this vulnerability poses a significant risk to customer privacy and data protection compliance. The unauthorized disclosure of personally identifiable information (PII) such as names, geographic locations, and purchase details can lead to breaches of the EU General Data Protection Regulation (GDPR), resulting in potential fines and legal consequences. Additionally, the exposure of purchase behavior and product details could be leveraged for targeted phishing or social engineering attacks. E-commerce businesses relying on WooCommerce with this plugin may suffer reputational damage and loss of customer trust if exploited. The vulnerability does not affect system integrity or availability directly but compromises confidentiality, which is critical for maintaining compliance and customer confidence. Given the ease of exploitation without authentication or user interaction, attackers can automate data harvesting at scale, increasing the potential impact. Organizations operating in highly regulated sectors or handling sensitive customer data are particularly vulnerable.

Mitigation Recommendations

1. Immediately disable the Live sales notification for WooCommerce plugin until a security patch is released by the vendor. 2. Monitor official vendor channels and WordPress plugin repositories for updates addressing CVE-2025-12955 and apply patches promptly. 3. Implement web application firewall (WAF) rules to restrict access to endpoints related to order data retrieval, especially the 'getOrders' function, allowing only authenticated and authorized users. 4. Conduct a thorough audit of all WooCommerce plugins to ensure proper authorization checks are in place for sensitive data access. 5. Limit exposure of order information on public-facing interfaces and avoid displaying detailed customer data without strict access controls. 6. Review and enhance logging and monitoring to detect unusual access patterns or data exfiltration attempts targeting order information. 7. Educate development and security teams on secure coding practices, emphasizing authorization validation in plugin development. 8. For organizations with compliance requirements, document mitigation steps and incident response plans related to this vulnerability. 9. Consider alternative plugins with verified security postures if immediate patching is not feasible. 10. Regularly back up website data and configurations to enable rapid recovery in case of compromise.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-10T14:48:53.588Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 691c3e32a312a743bb510ba3

Added to database: 11/18/2025, 9:36:50 AM

Last enriched: 11/18/2025, 9:52:17 AM

Last updated: 11/18/2025, 9:50:50 PM

Views: 11

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats