Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13389: CWE-639 Authorization Bypass Through User-Controlled Key in nmedia Admin and Customer Messages After Order for WooCommerce: OrderConvo

0
Medium
VulnerabilityCVE-2025-13389cvecve-2025-13389cwe-639
Published: Tue Nov 25 2025 (11/25/2025, 07:28:21 UTC)
Source: CVE Database V5
Vendor/Project: nmedia
Product: Admin and Customer Messages After Order for WooCommerce: OrderConvo

Description

CVE-2025-13389 is a medium severity vulnerability in the WordPress plugin 'Admin and Customer Messages After Order for WooCommerce: OrderConvo' that allows unauthorized data access. The flaw arises from a missing capability check in the get_order_by_id() function, enabling unauthenticated attackers to retrieve sensitive WooCommerce order details and private messages by supplying arbitrary order IDs. This vulnerability affects all versions up to and including version 14 of the plugin. Exploitation requires no authentication or user interaction and can lead to confidentiality breaches of customer and administrative communications. No known exploits are currently reported in the wild. European organizations using WooCommerce with this plugin are at risk of data leakage, potentially impacting customer privacy and trust. Mitigation involves applying patches when available, restricting access to order data, and monitoring for suspicious requests. Countries with high WooCommerce adoption and e-commerce activity, such as Germany, the UK, France, and the Netherlands, are most likely to be affected. Given the ease of exploitation and sensitive data exposure, organizations should prioritize remediation to prevent unauthorized data disclosure.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:47:46 UTC

Technical Analysis

CVE-2025-13389 is a vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the WordPress plugin 'Admin and Customer Messages After Order for WooCommerce: OrderConvo'. The issue stems from the absence of proper capability checks in the get_order_by_id() function, which is responsible for retrieving order details and associated customer-administrator messages. Because this function does not verify whether the requesting user has the appropriate permissions, unauthenticated attackers can supply arbitrary order IDs to access sensitive information. This includes private conversations and order details that should only be accessible to authorized users. The vulnerability affects all plugin versions up to and including version 14. The CVSS 3.1 base score is 5.3, indicating medium severity, with an attack vector of network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to confidentiality (C:L) without affecting integrity or availability. No patches or known exploits are currently reported, but the vulnerability poses a significant risk to the confidentiality of customer data and internal communications within WooCommerce stores using this plugin. The flaw is particularly critical in e-commerce environments where customer trust and data privacy are paramount.

Potential Impact

For European organizations, the primary impact of this vulnerability is the unauthorized disclosure of sensitive customer order information and private messages exchanged between customers and store administrators. This breach of confidentiality can lead to loss of customer trust, reputational damage, and potential violations of data protection regulations such as the GDPR, which mandates strict controls over personal data access and processing. Although the vulnerability does not affect data integrity or system availability, the exposure of private communications and order details can facilitate further social engineering attacks or fraud. E-commerce businesses relying on WooCommerce with this plugin are particularly vulnerable, as attackers can exploit the flaw remotely without authentication or user interaction. This risk is heightened in sectors with high transaction volumes and sensitive customer data, such as retail, luxury goods, and health-related products. Additionally, the lack of known exploits in the wild suggests that proactive mitigation is critical to prevent future exploitation attempts.

Mitigation Recommendations

1. Monitor the plugin vendor's official channels for security patches and apply updates immediately once available. 2. Until a patch is released, implement web application firewall (WAF) rules to detect and block requests containing suspicious order ID parameters targeting the get_order_by_id() function. 3. Restrict access to the WooCommerce order data endpoints by IP whitelisting or requiring authentication at the web server or application level. 4. Conduct thorough audits of user permissions and ensure that only authorized roles can access order and message data. 5. Implement logging and alerting for unusual access patterns to order details, such as repeated requests with varying order IDs from the same IP address. 6. Educate development and security teams about the risks of missing authorization checks in custom or third-party plugins. 7. Consider isolating or disabling the vulnerable plugin if it is not essential to business operations until a secure version is available. 8. Review and enhance overall WordPress and WooCommerce security posture, including regular updates, strong authentication, and least privilege principles.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-18T21:12:44.956Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69255e28292ce6fc00be0620

Added to database: 11/25/2025, 7:43:36 AM

Last enriched: 12/2/2025, 2:47:46 PM

Last updated: 12/4/2025, 3:52:44 PM

Views: 40

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats