CVE-2025-13441: CWE-862 Missing Authorization in themesupport Hide Category by User Role for WooCommerce
The Hide Category by User Role for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.1. This is due to a missing capability check on the admin_init hook that executes wp_cache_flush(). This makes it possible for unauthenticated attackers to flush the site's object cache via forged requests, potentially degrading site performance.
AI Analysis
Technical Summary
CVE-2025-13441 identifies a missing authorization vulnerability (CWE-862) in the Hide Category by User Role for WooCommerce plugin, a WordPress extension designed to control category visibility based on user roles. The vulnerability exists in all versions up to and including 2.3.1 due to the absence of a capability check on the admin_init hook, which executes the wp_cache_flush() function. This function clears the WordPress object cache, which is critical for performance optimization by storing frequently accessed data. Because the authorization check is missing, unauthenticated attackers can send forged HTTP requests that trigger cache flushing without any privileges or user interaction. While this does not allow attackers to access or modify sensitive data, it can degrade website performance by forcing repeated cache rebuilds, potentially slowing down page load times and increasing server load. The vulnerability is remotely exploitable over the network without authentication or user interaction, increasing its accessibility. No patches are currently linked, and no known exploits have been reported in the wild, but the risk remains for sites using this plugin in production environments. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or availability impact, but some integrity impact due to unauthorized cache flushes.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce with the affected plugin, this vulnerability can lead to degraded website performance and slower response times. This may result in poor user experience, reduced customer satisfaction, and potential revenue loss during high traffic periods. While the vulnerability does not directly expose sensitive data or cause service outages, the forced cache flushes can increase server load and resource consumption, potentially leading to indirect availability issues if the server becomes overwhelmed. Organizations relying heavily on fast and reliable WooCommerce storefronts are particularly vulnerable. Additionally, repeated exploitation attempts could be used as part of a broader denial-of-service strategy. The impact is more pronounced for businesses with limited hosting resources or those without robust caching and performance monitoring solutions.
Mitigation Recommendations
Since no official patches are currently available, organizations should implement immediate compensating controls. These include adding custom authorization checks on the admin_init hook to ensure only authenticated administrators can trigger wp_cache_flush(). Web application firewalls (WAFs) can be configured to block suspicious requests targeting cache flush endpoints or unusual admin_init hook triggers. Monitoring and alerting on unexpected cache flush events can help detect exploitation attempts early. Organizations should also consider disabling or replacing the vulnerable plugin if it is not essential or if alternative plugins with better security posture exist. Regularly updating WordPress core, WooCommerce, and all plugins remains critical. Once a patch is released, prompt application is necessary. Additionally, limiting public access to administrative endpoints and enforcing strong authentication mechanisms reduces the attack surface.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13441: CWE-862 Missing Authorization in themesupport Hide Category by User Role for WooCommerce
Description
The Hide Category by User Role for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.3.1. This is due to a missing capability check on the admin_init hook that executes wp_cache_flush(). This makes it possible for unauthenticated attackers to flush the site's object cache via forged requests, potentially degrading site performance.
AI-Powered Analysis
Technical Analysis
CVE-2025-13441 identifies a missing authorization vulnerability (CWE-862) in the Hide Category by User Role for WooCommerce plugin, a WordPress extension designed to control category visibility based on user roles. The vulnerability exists in all versions up to and including 2.3.1 due to the absence of a capability check on the admin_init hook, which executes the wp_cache_flush() function. This function clears the WordPress object cache, which is critical for performance optimization by storing frequently accessed data. Because the authorization check is missing, unauthenticated attackers can send forged HTTP requests that trigger cache flushing without any privileges or user interaction. While this does not allow attackers to access or modify sensitive data, it can degrade website performance by forcing repeated cache rebuilds, potentially slowing down page load times and increasing server load. The vulnerability is remotely exploitable over the network without authentication or user interaction, increasing its accessibility. No patches are currently linked, and no known exploits have been reported in the wild, but the risk remains for sites using this plugin in production environments. The CVSS 3.1 vector (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N) indicates network attack vector, low attack complexity, no privileges or user interaction required, unchanged scope, no confidentiality or availability impact, but some integrity impact due to unauthorized cache flushes.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce with the affected plugin, this vulnerability can lead to degraded website performance and slower response times. This may result in poor user experience, reduced customer satisfaction, and potential revenue loss during high traffic periods. While the vulnerability does not directly expose sensitive data or cause service outages, the forced cache flushes can increase server load and resource consumption, potentially leading to indirect availability issues if the server becomes overwhelmed. Organizations relying heavily on fast and reliable WooCommerce storefronts are particularly vulnerable. Additionally, repeated exploitation attempts could be used as part of a broader denial-of-service strategy. The impact is more pronounced for businesses with limited hosting resources or those without robust caching and performance monitoring solutions.
Mitigation Recommendations
Since no official patches are currently available, organizations should implement immediate compensating controls. These include adding custom authorization checks on the admin_init hook to ensure only authenticated administrators can trigger wp_cache_flush(). Web application firewalls (WAFs) can be configured to block suspicious requests targeting cache flush endpoints or unusual admin_init hook triggers. Monitoring and alerting on unexpected cache flush events can help detect exploitation attempts early. Organizations should also consider disabling or replacing the vulnerable plugin if it is not essential or if alternative plugins with better security posture exist. Regularly updating WordPress core, WooCommerce, and all plugins remains critical. Once a patch is released, prompt application is necessary. Additionally, limiting public access to administrative endpoints and enforcing strong authentication mechanisms reduces the attack surface.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-19T19:08:27.063Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6927f676e2794b4b765ba3a0
Added to database: 11/27/2025, 6:57:58 AM
Last enriched: 11/27/2025, 7:04:45 AM
Last updated: 11/27/2025, 9:09:38 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-13536: CWE-434 Unrestricted Upload of File with Dangerous Type in blubrry PowerPress Podcasting plugin by Blubrry
HighCVE-2025-13157: CWE-639 Authorization Bypass Through User-Controlled Key in qodeinteractive QODE Wishlist for WooCommerce
MediumCVE-2025-12758: Incomplete Filtering of One or More Instances of Special Elements in validator
HighCVE-2025-13525: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in listingthemes WP Directory Kit
MediumCVE-2025-13143: CWE-352 Cross-Site Request Forgery (CSRF) in assafp Poll, Survey & Quiz Maker Plugin by Opinion Stage
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.