Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13441: CWE-862 Missing Authorization in themesupport Hide Category by User Role for WooCommerce

0
Medium
VulnerabilityCVE-2025-13441cvecve-2025-13441cwe-862
Published: Thu Nov 27 2025 (11/27/2025, 06:42:12 UTC)
Source: CVE Database V5
Vendor/Project: themesupport
Product: Hide Category by User Role for WooCommerce

Description

The Hide Category by User Role for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.1. This is due to a missing capability check on the admin_init hook that executes wp_cache_flush(). This makes it possible for unauthenticated attackers to flush the site's object cache via forged requests, potentially degrading site performance.

AI-Powered Analysis

AILast updated: 11/27/2025, 07:04:45 UTC

Technical Analysis

CVE-2025-13441 identifies a missing authorization vulnerability (CWE-862) in the Hide Category by User Role for WooCommerce plugin, a WordPress extension designed to control category visibility based on user roles. The vulnerability exists in all versions up to and including 2.3.1 due to the absence of a capability check on the admin_init hook, which executes the wp_cache_flush() function. This function clears the WordPress object cache, which is critical for performance optimization by storing frequently accessed data. Because the authorization check is missing, unauthenticated attackers can send forged HTTP requests that trigger cache flushing without any privileges or user interaction. While this does not allow attackers to access or modify sensitive data, it can degrade website performance by forcing repeated cache rebuilds, potentially slowing down page load times and increasing server load. The vulnerability is remotely exploitable over the network without authentication or user interaction, increasing its accessibility. No patches are currently linked, and no known exploits have been reported in the wild, but the risk remains for sites using this plugin in production environments. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or availability impact, but some integrity impact due to unauthorized cache flushes.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce with the affected plugin, this vulnerability can lead to degraded website performance and slower response times. This may result in poor user experience, reduced customer satisfaction, and potential revenue loss during high traffic periods. While the vulnerability does not directly expose sensitive data or cause service outages, the forced cache flushes can increase server load and resource consumption, potentially leading to indirect availability issues if the server becomes overwhelmed. Organizations relying heavily on fast and reliable WooCommerce storefronts are particularly vulnerable. Additionally, repeated exploitation attempts could be used as part of a broader denial-of-service strategy. The impact is more pronounced for businesses with limited hosting resources or those without robust caching and performance monitoring solutions.

Mitigation Recommendations

Since no official patches are currently available, organizations should implement immediate compensating controls. These include adding custom authorization checks on the admin_init hook to ensure only authenticated administrators can trigger wp_cache_flush(). Web application firewalls (WAFs) can be configured to block suspicious requests targeting cache flush endpoints or unusual admin_init hook triggers. Monitoring and alerting on unexpected cache flush events can help detect exploitation attempts early. Organizations should also consider disabling or replacing the vulnerable plugin if it is not essential or if alternative plugins with better security posture exist. Regularly updating WordPress core, WooCommerce, and all plugins remains critical. Once a patch is released, prompt application is necessary. Additionally, limiting public access to administrative endpoints and enforcing strong authentication mechanisms reduces the attack surface.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T19:08:27.063Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6927f676e2794b4b765ba3a0

Added to database: 11/27/2025, 6:57:58 AM

Last enriched: 11/27/2025, 7:04:45 AM

Last updated: 11/27/2025, 9:09:38 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats