Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13441: CWE-862 Missing Authorization in themesupport Hide Category by User Role for WooCommerce

0
Medium
VulnerabilityCVE-2025-13441cvecve-2025-13441cwe-862
Published: Thu Nov 27 2025 (11/27/2025, 06:42:12 UTC)
Source: CVE Database V5
Vendor/Project: themesupport
Product: Hide Category by User Role for WooCommerce

Description

The Hide Category by User Role for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.1. This is due to a missing capability check on the admin_init hook that executes wp_cache_flush(). This makes it possible for unauthenticated attackers to flush the site's object cache via forged requests, potentially degrading site performance.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:52:46 UTC

Technical Analysis

The vulnerability identified as CVE-2025-13441 affects the Hide Category by User Role for WooCommerce plugin developed by themesupport for WordPress. This plugin allows site administrators to control category visibility based on user roles. The issue stems from a missing authorization check on the admin_init hook, which calls the WordPress function wp_cache_flush() without verifying the requester's permissions. As a result, unauthenticated attackers can send specially crafted requests to trigger cache flushing. Flushing the object cache repeatedly can degrade site performance by forcing the system to rebuild cached data, increasing server load and slowing down page responses. The vulnerability is classified under CWE-862 (Missing Authorization), indicating a failure to properly restrict access to a sensitive operation. The CVSS v3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based, requires no privileges or user interaction, and impacts integrity by enabling unauthorized cache flushes. No confidentiality or availability impacts are noted. The vulnerability affects all versions of the plugin up to 2.3.1, and as of the publication date, no patches or known exploits have been reported. The flaw is significant because object caching is critical for WordPress performance, especially on WooCommerce sites with high traffic and dynamic content. Attackers exploiting this vulnerability could cause intermittent slowdowns or denial of service conditions indirectly by exhausting server resources. The lack of authentication requirement makes this vulnerability easier to exploit remotely. However, the impact is limited to performance degradation rather than data theft or site takeover.

Potential Impact

The primary impact of CVE-2025-13441 is the potential degradation of site performance on WordPress installations running the vulnerable Hide Category by User Role for WooCommerce plugin. By allowing unauthenticated attackers to flush the object cache repeatedly, the vulnerability can increase server load and response times, potentially leading to slower user experiences and increased resource consumption. This can indirectly affect availability if the server becomes overwhelmed, though no direct denial of service is guaranteed. For e-commerce sites using WooCommerce, performance degradation can translate into lost sales, reduced customer satisfaction, and reputational damage. Since the vulnerability does not expose sensitive data or allow code execution, confidentiality and integrity impacts are minimal. However, the integrity of site operations is affected due to unauthorized cache manipulation. Organizations with high-traffic WooCommerce stores are at greater risk of operational disruption. Additionally, attackers could combine this vulnerability with other exploits to amplify impact. The lack of authentication and user interaction requirements increases the likelihood of exploitation, especially by automated scanning tools. Overall, the threat poses a moderate risk to the stability and reliability of affected e-commerce platforms worldwide.

Mitigation Recommendations

To mitigate CVE-2025-13441, organizations should first monitor the plugin vendor's communications for an official patch and apply it promptly once released. Until a patch is available, administrators can implement temporary workarounds such as restricting access to the admin_init hook or wp_cache_flush() function via custom code or security plugins that enforce capability checks. Deploying a Web Application Firewall (WAF) with rules to detect and block unauthorized requests attempting to trigger cache flushes can reduce exploitation risk. Monitoring server logs for unusual cache flush activity or spikes in resource usage can help identify attempted attacks. Limiting public access to administrative endpoints and enforcing strict authentication and authorization policies on the WordPress backend reduces exposure. Additionally, organizations should ensure their WordPress and WooCommerce installations are up to date and follow best practices for plugin management, including removing unused plugins. Regular performance monitoring and alerting can detect degradation early. Security teams should also educate site administrators about the risks of installing plugins from less vetted sources and encourage the use of security-focused plugins that add authorization checks. Finally, consider isolating caching layers or using external caching services that are less susceptible to such unauthorized flushes.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T19:08:27.063Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6927f676e2794b4b765ba3a0

Added to database: 11/27/2025, 6:57:58 AM

Last enriched: 2/27/2026, 9:52:46 AM

Last updated: 3/25/2026, 4:57:27 PM

Views: 150

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses