Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13314: CWE-862 Missing Authorization in markutos987 Product Filtering by Categories, Tags, Price Range for WooCommerce – Filter Plus

0
Medium
VulnerabilityCVE-2025-13314cvecve-2025-13314cwe-862
Published: Fri Dec 12 2025 (12/12/2025, 03:20:56 UTC)
Source: CVE Database V5
Vendor/Project: markutos987
Product: Product Filtering by Categories, Tags, Price Range for WooCommerce – Filter Plus

Description

The Product Filtering by Categories, Tags, Price Range for WooCommerce – Filter Plus plugin for WordPress is vulnerable to unauthorized modification of data in all versions up to, and including, 1.1.5 due to a missing capability check on the 'filter_save_settings' and 'add_filter_options' AJAX actions. This makes it possible for unauthenticated attackers to modify the plugin's settings and create arbitrary filter options.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:40:15 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13314 affects the 'Product Filtering by Categories, Tags, Price Range for WooCommerce – Filter Plus' plugin for WordPress, developed by markutos987. This plugin facilitates product filtering on WooCommerce stores by categories, tags, and price ranges. The core issue is a missing authorization (CWE-862) on two AJAX endpoints: 'filter_save_settings' and 'add_filter_options'. These endpoints lack capability checks, allowing unauthenticated attackers to invoke them and modify the plugin's settings arbitrarily. This can lead to unauthorized creation or alteration of filter options, potentially manipulating how products are displayed or filtered on the e-commerce site. The vulnerability affects all versions up to and including 1.1.5. The CVSS v3.1 score is 5.3 (medium severity), with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), integrity impact (I:L), and no availability impact (A:N). No patches or updates are currently linked, and no known exploits have been reported in the wild. The vulnerability could be exploited remotely without authentication, making it a significant risk for affected sites.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification of plugin settings, which compromises the integrity of the e-commerce site's filtering functionality. Attackers could manipulate product filters to mislead customers, hide or highlight specific products, or disrupt the shopping experience. Although confidentiality and availability are not directly affected, the integrity compromise can damage customer trust, lead to revenue loss, and potentially facilitate further attacks by altering site behavior. Since the vulnerability requires no authentication and can be exploited remotely, any WooCommerce store using the affected plugin version is at risk. This could be particularly damaging for high-traffic e-commerce sites relying on accurate product filtering for sales and customer satisfaction.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately update the plugin to a version that includes proper authorization checks once available. In the absence of an official patch, site administrators can implement temporary workarounds such as restricting access to the vulnerable AJAX endpoints via web application firewall (WAF) rules or server-level access controls to allow only trusted IP addresses. Additionally, monitoring and logging AJAX requests to detect suspicious activity targeting 'filter_save_settings' and 'add_filter_options' actions can help identify exploitation attempts. It is also advisable to review and harden WordPress user roles and permissions to minimize the impact of any unauthorized changes. Regular backups of plugin settings and site data should be maintained to enable quick restoration if unauthorized modifications occur.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-17T15:01:06.519Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693b9182650da22753edbaf7

Added to database: 12/12/2025, 3:52:34 AM

Last enriched: 2/27/2026, 9:40:15 AM

Last updated: 3/26/2026, 4:14:35 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses