Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13452: CWE-639 Authorization Bypass Through User-Controlled Key in nmedia Admin and Customer Messages After Order for WooCommerce: OrderConvo

0
Medium
VulnerabilityCVE-2025-13452cvecve-2025-13452cwe-639
Published: Tue Nov 25 2025 (11/25/2025, 07:28:20 UTC)
Source: CVE Database V5
Vendor/Project: nmedia
Product: Admin and Customer Messages After Order for WooCommerce: OrderConvo

Description

The Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 14. This is due to a flawed permission check in the REST API permission callback that returns true when no nonce is provided. This makes it possible for unauthenticated attackers to impersonate any WordPress user and inject arbitrary messages into any WooCommerce order conversation by directly calling the REST endpoint with controlled user_id, order_id, and context parameters.

AI-Powered Analysis

AILast updated: 12/02/2025, 14:45:38 UTC

Technical Analysis

CVE-2025-13452 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress. The vulnerability exists in all versions up to and including version 14 due to a flawed permission check in the REST API permission callback. Specifically, the callback erroneously returns true when no nonce is provided, effectively bypassing the intended authorization mechanism. This flaw enables unauthenticated attackers to impersonate any WordPress user by directly invoking the REST endpoint with controlled parameters such as user_id, order_id, and context. Consequently, attackers can inject arbitrary messages into any WooCommerce order conversation, potentially misleading customers or administrators. The vulnerability impacts message integrity but does not compromise confidentiality or availability. The CVSS v3.1 base score is 4.3 (medium), reflecting the network attack vector, low attack complexity, requirement for some privileges (PR:L), no user interaction, and limited impact on integrity only. No patches or known exploits are currently available, but the vulnerability poses a risk to the trustworthiness of order communications in WooCommerce environments using this plugin.

Potential Impact

For European organizations, this vulnerability can undermine the integrity of order-related communications within WooCommerce, a widely used e-commerce platform. Attackers could inject misleading or fraudulent messages into order conversations, potentially causing confusion, fraud, or reputational damage. While the vulnerability does not directly expose sensitive data or disrupt service availability, the manipulation of order messages could facilitate social engineering attacks, customer dissatisfaction, or operational errors. E-commerce businesses relying on WooCommerce and this plugin may face increased risk of customer trust erosion and potential financial losses due to misinformation or fraudulent order communications. The impact is particularly relevant for organizations with high volumes of online transactions and customer interactions through WooCommerce order messaging.

Mitigation Recommendations

Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting access to the vulnerable REST API endpoints by enforcing strict authentication and authorization checks at the web server or application firewall level. Administrators should verify nonce validation is properly enforced and consider disabling or limiting the use of the affected plugin until a patch is released. Monitoring REST API logs for unusual or unauthorized requests targeting order conversations can help detect exploitation attempts. Additionally, organizations should educate staff and customers to be vigilant for suspicious messages in order conversations. Once a vendor patch is released, prompt application of updates is critical. Reviewing and tightening WordPress user role permissions and REST API exposure can further reduce attack surface.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T19:28:16.353Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69255e2a292ce6fc00be0647

Added to database: 11/25/2025, 7:43:38 AM

Last enriched: 12/2/2025, 2:45:38 PM

Last updated: 1/10/2026, 10:16:20 PM

Views: 90

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats