CVE-2025-12975: CWE-862 Missing Authorization in wahid0003 Product Feed Manager for WooCommerce – CTX Feed – Support 220+ Shopping & Social Channels
The CTX Feed – WooCommerce Product Feed Manager plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the woo_feed_plugin_installing() function in all versions up to, and including, 6.6.11. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to install arbitrary plugins which can be leveraged to achieve remote code execution.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-12975 affects the CTX Feed – WooCommerce Product Feed Manager plugin, a widely used WordPress plugin that supports over 220 shopping and social channels. The root cause is a missing authorization check (CWE-862) in the woo_feed_plugin_installing() function, which fails to verify whether the authenticated user has sufficient capabilities to install plugins. This flaw allows any user with Shop Manager-level access or higher to install arbitrary plugins without proper permission validation. Since plugin installation in WordPress can lead to remote code execution (RCE), attackers can leverage this vulnerability to execute malicious code on the server, potentially gaining full control over the affected website and underlying infrastructure. The CVSS v3.1 score of 7.2 reflects high severity, with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. Exploitation does not require user interaction but does require authenticated access with elevated privileges. No public exploits are known at this time, but the vulnerability's nature makes it a critical concern for WooCommerce-based e-commerce sites. The vulnerability affects all versions up to and including 6.6.11 of the plugin, and no patch links are currently provided, indicating the need for vendor action. The flaw is particularly dangerous because Shop Manager roles are commonly assigned to trusted staff who manage product feeds but may not have full administrative oversight, increasing the risk of insider threats or compromised accounts being exploited.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce and the CTX Feed plugin, this vulnerability could lead to severe consequences. Unauthorized plugin installation can result in remote code execution, allowing attackers to deploy backdoors, steal sensitive customer data including payment information, manipulate product listings, or disrupt business operations through site defacement or denial of service. The breach of confidentiality and integrity could damage customer trust and lead to regulatory penalties under GDPR due to exposure of personal data. The availability impact could cause significant revenue loss during downtime. Since Shop Manager roles are often assigned to non-technical staff, the risk of accidental or malicious exploitation increases. The vulnerability also raises concerns for managed service providers and hosting companies supporting WooCommerce clients across Europe, potentially affecting multiple customers. The lack of a current patch means organizations must rely on compensating controls, increasing operational overhead and risk exposure.
Mitigation Recommendations
Immediate mitigation steps include restricting Shop Manager privileges to only trusted personnel and auditing existing user roles to ensure no unnecessary elevated access is granted. Organizations should monitor WordPress plugin installation logs and file system changes for unauthorized activity. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious plugin installation attempts can provide temporary protection. Regularly backing up WordPress sites and databases is critical to enable recovery in case of compromise. Organizations should track vendor communications closely and apply patches promptly once released. Additionally, consider deploying multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of account compromise. Security teams should conduct internal penetration testing focusing on privilege escalation paths within WordPress environments. Finally, educating staff about the risks associated with plugin management and access control can help prevent accidental exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12975: CWE-862 Missing Authorization in wahid0003 Product Feed Manager for WooCommerce – CTX Feed – Support 220+ Shopping & Social Channels
Description
The CTX Feed – WooCommerce Product Feed Manager plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the woo_feed_plugin_installing() function in all versions up to, and including, 6.6.11. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to install arbitrary plugins which can be leveraged to achieve remote code execution.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-12975 affects the CTX Feed – WooCommerce Product Feed Manager plugin, a widely used WordPress plugin that supports over 220 shopping and social channels. The root cause is a missing authorization check (CWE-862) in the woo_feed_plugin_installing() function, which fails to verify whether the authenticated user has sufficient capabilities to install plugins. This flaw allows any user with Shop Manager-level access or higher to install arbitrary plugins without proper permission validation. Since plugin installation in WordPress can lead to remote code execution (RCE), attackers can leverage this vulnerability to execute malicious code on the server, potentially gaining full control over the affected website and underlying infrastructure. The CVSS v3.1 score of 7.2 reflects high severity, with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. Exploitation does not require user interaction but does require authenticated access with elevated privileges. No public exploits are known at this time, but the vulnerability's nature makes it a critical concern for WooCommerce-based e-commerce sites. The vulnerability affects all versions up to and including 6.6.11 of the plugin, and no patch links are currently provided, indicating the need for vendor action. The flaw is particularly dangerous because Shop Manager roles are commonly assigned to trusted staff who manage product feeds but may not have full administrative oversight, increasing the risk of insider threats or compromised accounts being exploited.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce and the CTX Feed plugin, this vulnerability could lead to severe consequences. Unauthorized plugin installation can result in remote code execution, allowing attackers to deploy backdoors, steal sensitive customer data including payment information, manipulate product listings, or disrupt business operations through site defacement or denial of service. The breach of confidentiality and integrity could damage customer trust and lead to regulatory penalties under GDPR due to exposure of personal data. The availability impact could cause significant revenue loss during downtime. Since Shop Manager roles are often assigned to non-technical staff, the risk of accidental or malicious exploitation increases. The vulnerability also raises concerns for managed service providers and hosting companies supporting WooCommerce clients across Europe, potentially affecting multiple customers. The lack of a current patch means organizations must rely on compensating controls, increasing operational overhead and risk exposure.
Mitigation Recommendations
Immediate mitigation steps include restricting Shop Manager privileges to only trusted personnel and auditing existing user roles to ensure no unnecessary elevated access is granted. Organizations should monitor WordPress plugin installation logs and file system changes for unauthorized activity. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious plugin installation attempts can provide temporary protection. Regularly backing up WordPress sites and databases is critical to enable recovery in case of compromise. Organizations should track vendor communications closely and apply patches promptly once released. Additionally, consider deploying multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of account compromise. Security teams should conduct internal penetration testing focusing on privilege escalation paths within WordPress environments. Finally, educating staff about the risks associated with plugin management and access control can help prevent accidental exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-10T18:30:18.891Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699697f26aea4a407a3bdfb5
Added to database: 2/19/2026, 4:56:18 AM
Last enriched: 2/19/2026, 5:26:19 AM
Last updated: 2/21/2026, 12:17:36 AM
Views: 9
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.