Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12975: CWE-862 Missing Authorization in wahid0003 Product Feed Manager for WooCommerce – CTX Feed – Support 220+ Shopping & Social Channels

0
High
VulnerabilityCVE-2025-12975cvecve-2025-12975cwe-862
Published: Thu Feb 19 2026 (02/19/2026, 04:36:10 UTC)
Source: CVE Database V5
Vendor/Project: wahid0003
Product: Product Feed Manager for WooCommerce – CTX Feed – Support 220+ Shopping & Social Channels

Description

The CTX Feed – WooCommerce Product Feed Manager plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the woo_feed_plugin_installing() function in all versions up to, and including, 6.6.11. This makes it possible for authenticated attackers, with Shop Manager-level access and above, to install arbitrary plugins which can be leveraged to achieve remote code execution.

AI-Powered Analysis

AILast updated: 02/19/2026, 05:26:19 UTC

Technical Analysis

The vulnerability identified as CVE-2025-12975 affects the CTX Feed – WooCommerce Product Feed Manager plugin, a widely used WordPress plugin that supports over 220 shopping and social channels. The root cause is a missing authorization check (CWE-862) in the woo_feed_plugin_installing() function, which fails to verify whether the authenticated user has sufficient capabilities to install plugins. This flaw allows any user with Shop Manager-level access or higher to install arbitrary plugins without proper permission validation. Since plugin installation in WordPress can lead to remote code execution (RCE), attackers can leverage this vulnerability to execute malicious code on the server, potentially gaining full control over the affected website and underlying infrastructure. The CVSS v3.1 score of 7.2 reflects high severity, with network attack vector, low attack complexity, and high impact on confidentiality, integrity, and availability. Exploitation does not require user interaction but does require authenticated access with elevated privileges. No public exploits are known at this time, but the vulnerability's nature makes it a critical concern for WooCommerce-based e-commerce sites. The vulnerability affects all versions up to and including 6.6.11 of the plugin, and no patch links are currently provided, indicating the need for vendor action. The flaw is particularly dangerous because Shop Manager roles are commonly assigned to trusted staff who manage product feeds but may not have full administrative oversight, increasing the risk of insider threats or compromised accounts being exploited.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce and the CTX Feed plugin, this vulnerability could lead to severe consequences. Unauthorized plugin installation can result in remote code execution, allowing attackers to deploy backdoors, steal sensitive customer data including payment information, manipulate product listings, or disrupt business operations through site defacement or denial of service. The breach of confidentiality and integrity could damage customer trust and lead to regulatory penalties under GDPR due to exposure of personal data. The availability impact could cause significant revenue loss during downtime. Since Shop Manager roles are often assigned to non-technical staff, the risk of accidental or malicious exploitation increases. The vulnerability also raises concerns for managed service providers and hosting companies supporting WooCommerce clients across Europe, potentially affecting multiple customers. The lack of a current patch means organizations must rely on compensating controls, increasing operational overhead and risk exposure.

Mitigation Recommendations

Immediate mitigation steps include restricting Shop Manager privileges to only trusted personnel and auditing existing user roles to ensure no unnecessary elevated access is granted. Organizations should monitor WordPress plugin installation logs and file system changes for unauthorized activity. Implementing Web Application Firewalls (WAFs) with rules to detect and block suspicious plugin installation attempts can provide temporary protection. Regularly backing up WordPress sites and databases is critical to enable recovery in case of compromise. Organizations should track vendor communications closely and apply patches promptly once released. Additionally, consider deploying multi-factor authentication (MFA) for all users with elevated privileges to reduce the risk of account compromise. Security teams should conduct internal penetration testing focusing on privilege escalation paths within WordPress environments. Finally, educating staff about the risks associated with plugin management and access control can help prevent accidental exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-10T18:30:18.891Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699697f26aea4a407a3bdfb5

Added to database: 2/19/2026, 4:56:18 AM

Last enriched: 2/19/2026, 5:26:19 AM

Last updated: 2/21/2026, 12:17:36 AM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats