CVE-2025-13314: CWE-862 Missing Authorization in markutos987 Product Filtering by Categories, Tags, Price Range for WooCommerce – Filter Plus
The Product Filtering by Categories, Tags, Price Range for WooCommerce – Filter Plus plugin for WordPress is vulnerable to unauthorized modification of data in all versions up to, and including, 1.1.5 due to a missing capability check on the 'filter_save_settings' and 'add_filter_options' AJAX actions. This makes it possible for unauthenticated attackers to modify the plugin's settings and create arbitrary filter options.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-13314 affects the WordPress plugin 'Product Filtering by Categories, Tags, Price Range for WooCommerce – Filter Plus' developed by markutos987. This plugin is widely used to enhance WooCommerce stores by providing advanced product filtering capabilities. The root cause of the vulnerability is a missing authorization check (CWE-862) on two AJAX endpoints: 'filter_save_settings' and 'add_filter_options'. These endpoints handle requests to save plugin settings and add new filter options, respectively. Because the plugin fails to verify whether the requester has the necessary permissions, unauthenticated attackers can invoke these AJAX actions remotely without any credentials or user interaction. This allows attackers to modify the plugin’s configuration arbitrarily, potentially injecting malicious or misleading filter options that could alter the shopping experience or be leveraged for further exploitation. The vulnerability affects all versions up to 1.1.5, and no patches are currently linked, indicating that users must be vigilant. The CVSS v3.1 score is 5.3 (medium severity), reflecting the lack of confidentiality or availability impact but acknowledging the integrity compromise and ease of exploitation. Although no known exploits are reported in the wild, the vulnerability’s presence in a popular e-commerce plugin makes it a significant risk for WooCommerce-based online stores.
Potential Impact
For European organizations operating WooCommerce-based e-commerce platforms, this vulnerability poses a risk of unauthorized modification of product filtering settings. Such unauthorized changes can degrade user experience by presenting incorrect or manipulated product filters, potentially leading to loss of customer trust and revenue. Additionally, attackers could use this foothold to insert misleading filters that redirect customers to malicious products or phishing pages if combined with other vulnerabilities. While the vulnerability does not directly expose sensitive data or cause service outages, the integrity compromise can facilitate further attacks or fraud. Given the widespread use of WooCommerce in Europe, especially among small and medium-sized enterprises, the threat could have broad implications. Regulatory compliance under GDPR may also be impacted if the altered filters lead to unauthorized data processing or misrepresentation of product information. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
European organizations should immediately verify if their WooCommerce installations use the 'Product Filtering by Categories, Tags, Price Range for WooCommerce – Filter Plus' plugin at version 1.1.5 or earlier. Since no official patch links are provided, users should monitor the vendor’s channels for updates or consider disabling the plugin temporarily to prevent exploitation. As a practical mitigation, implement Web Application Firewall (WAF) rules to block unauthorized access to the vulnerable AJAX endpoints ('filter_save_settings' and 'add_filter_options'), restricting these actions to authenticated and authorized users only. Additionally, review and harden WordPress user roles and permissions to minimize exposure. Regularly audit plugin configurations and monitor logs for suspicious AJAX requests. Organizations should also consider alternative, more secure filtering plugins if immediate patching is not feasible. Finally, maintain up-to-date backups to enable recovery if unauthorized changes occur.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden
CVE-2025-13314: CWE-862 Missing Authorization in markutos987 Product Filtering by Categories, Tags, Price Range for WooCommerce – Filter Plus
Description
The Product Filtering by Categories, Tags, Price Range for WooCommerce – Filter Plus plugin for WordPress is vulnerable to unauthorized modification of data in all versions up to, and including, 1.1.5 due to a missing capability check on the 'filter_save_settings' and 'add_filter_options' AJAX actions. This makes it possible for unauthenticated attackers to modify the plugin's settings and create arbitrary filter options.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-13314 affects the WordPress plugin 'Product Filtering by Categories, Tags, Price Range for WooCommerce – Filter Plus' developed by markutos987. This plugin is widely used to enhance WooCommerce stores by providing advanced product filtering capabilities. The root cause of the vulnerability is a missing authorization check (CWE-862) on two AJAX endpoints: 'filter_save_settings' and 'add_filter_options'. These endpoints handle requests to save plugin settings and add new filter options, respectively. Because the plugin fails to verify whether the requester has the necessary permissions, unauthenticated attackers can invoke these AJAX actions remotely without any credentials or user interaction. This allows attackers to modify the plugin’s configuration arbitrarily, potentially injecting malicious or misleading filter options that could alter the shopping experience or be leveraged for further exploitation. The vulnerability affects all versions up to 1.1.5, and no patches are currently linked, indicating that users must be vigilant. The CVSS v3.1 score is 5.3 (medium severity), reflecting the lack of confidentiality or availability impact but acknowledging the integrity compromise and ease of exploitation. Although no known exploits are reported in the wild, the vulnerability’s presence in a popular e-commerce plugin makes it a significant risk for WooCommerce-based online stores.
Potential Impact
For European organizations operating WooCommerce-based e-commerce platforms, this vulnerability poses a risk of unauthorized modification of product filtering settings. Such unauthorized changes can degrade user experience by presenting incorrect or manipulated product filters, potentially leading to loss of customer trust and revenue. Additionally, attackers could use this foothold to insert misleading filters that redirect customers to malicious products or phishing pages if combined with other vulnerabilities. While the vulnerability does not directly expose sensitive data or cause service outages, the integrity compromise can facilitate further attacks or fraud. Given the widespread use of WooCommerce in Europe, especially among small and medium-sized enterprises, the threat could have broad implications. Regulatory compliance under GDPR may also be impacted if the altered filters lead to unauthorized data processing or misrepresentation of product information. The absence of known exploits reduces immediate risk but does not eliminate the potential for future attacks.
Mitigation Recommendations
European organizations should immediately verify if their WooCommerce installations use the 'Product Filtering by Categories, Tags, Price Range for WooCommerce – Filter Plus' plugin at version 1.1.5 or earlier. Since no official patch links are provided, users should monitor the vendor’s channels for updates or consider disabling the plugin temporarily to prevent exploitation. As a practical mitigation, implement Web Application Firewall (WAF) rules to block unauthorized access to the vulnerable AJAX endpoints ('filter_save_settings' and 'add_filter_options'), restricting these actions to authenticated and authorized users only. Additionally, review and harden WordPress user roles and permissions to minimize exposure. Regularly audit plugin configurations and monitor logs for suspicious AJAX requests. Organizations should also consider alternative, more secure filtering plugins if immediate patching is not feasible. Finally, maintain up-to-date backups to enable recovery if unauthorized changes occur.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-17T15:01:06.519Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693b9182650da22753edbaf7
Added to database: 12/12/2025, 3:52:34 AM
Last enriched: 12/12/2025, 4:09:11 AM
Last updated: 12/14/2025, 8:14:23 PM
Views: 10
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14672: Heap-based Buffer Overflow in gmg137 snap7-rs
MediumCVE-2025-14674: Injection in aizuda snail-job
MediumCVE-2025-14673: Heap-based Buffer Overflow in gmg137 snap7-rs
MediumCVE-2025-14668: SQL Injection in campcodes Advanced Online Examination System
MediumCVE-2025-14667: SQL Injection in itsourcecode COVID Tracking System
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.