Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13441: CWE-862 Missing Authorization in themesupport Hide Category by User Role for WooCommerce

0
Medium
VulnerabilityCVE-2025-13441cvecve-2025-13441cwe-862
Published: Thu Nov 27 2025 (11/27/2025, 06:42:12 UTC)
Source: CVE Database V5
Vendor/Project: themesupport
Product: Hide Category by User Role for WooCommerce

Description

The Hide Category by User Role for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.1. This is due to a missing capability check on the admin_init hook that executes wp_cache_flush(). This makes it possible for unauthenticated attackers to flush the site's object cache via forged requests, potentially degrading site performance.

AI-Powered Analysis

AILast updated: 12/04/2025, 07:23:39 UTC

Technical Analysis

CVE-2025-13441 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Hide Category by User Role for WooCommerce plugin for WordPress, affecting all versions up to and including 2.3.1. The root cause is the absence of a capability check on the admin_init hook, which executes the wp_cache_flush() function. This function is responsible for clearing the site's object cache, a mechanism used to improve performance by storing frequently accessed data in memory. Because the authorization check is missing, unauthenticated attackers can send forged requests that trigger cache flushing without any privilege verification. While this does not allow attackers to access or modify sensitive data directly, it can degrade site performance by forcing repeated cache rebuilds, potentially leading to slower page loads and increased server load. The vulnerability is remotely exploitable without authentication or user interaction, increasing its risk profile. However, no known exploits have been reported in the wild as of the publication date. The CVSS v3.1 base score is 5.3, reflecting a medium severity level due to the impact on integrity (cache state) but no direct confidentiality or availability compromise. The vulnerability affects a widely used e-commerce plugin integrated with WooCommerce, a popular WordPress e-commerce framework, making it relevant for many online retailers. The lack of a patch link suggests that a fix may not yet be publicly available, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, especially those operating e-commerce websites using WooCommerce with the affected plugin, this vulnerability can lead to degraded website performance due to frequent and unauthorized cache flushing. Performance degradation can result in slower page loads, negatively impacting user experience, customer satisfaction, and potentially reducing sales conversion rates. Additionally, increased server load from repeated cache rebuilds can raise hosting costs or cause resource exhaustion under high traffic conditions. While the vulnerability does not directly expose sensitive data or allow site takeover, the indirect effects on service quality can harm brand reputation and operational efficiency. Organizations relying heavily on WooCommerce for their online storefronts should consider this a moderate operational risk. The absence of known exploits reduces immediate threat but does not eliminate the risk of future attacks, especially as exploit code could be developed given the low complexity of exploitation.

Mitigation Recommendations

1. Monitor for updates from the plugin vendor and apply patches promptly once available. 2. Implement web application firewall (WAF) rules to detect and block unauthorized requests targeting the admin_init hook or wp_cache_flush() function. 3. Restrict access to administrative endpoints and hooks by IP whitelisting or authentication mechanisms where feasible. 4. Use security plugins that can enforce capability checks or alert on suspicious cache flush activity. 5. Regularly audit plugin usage and remove or replace plugins that are no longer maintained or have known vulnerabilities. 6. Employ caching strategies that reduce reliance on object cache flushing or use external caching layers (e.g., CDN) to mitigate performance impacts. 7. Conduct security awareness training for site administrators to recognize signs of performance degradation potentially caused by attacks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T19:08:27.063Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6927f676e2794b4b765ba3a0

Added to database: 11/27/2025, 6:57:58 AM

Last enriched: 12/4/2025, 7:23:39 AM

Last updated: 1/11/2026, 12:43:53 PM

Views: 99

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats