CVE-2025-13452: CWE-639 Authorization Bypass Through User-Controlled Key in nmedia Admin and Customer Messages After Order for WooCommerce: OrderConvo
The Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 14. This is due to a flawed permission check in the REST API permission callback that returns true when no nonce is provided. This makes it possible for unauthenticated attackers to impersonate any WordPress user and inject arbitrary messages into any WooCommerce order conversation by directly calling the REST endpoint with controlled user_id, order_id, and context parameters.
AI Analysis
Technical Summary
CVE-2025-13452 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress. The vulnerability exists in all versions up to and including version 14 due to a flawed permission check in the REST API permission callback. Specifically, the callback erroneously returns true when no nonce is provided, effectively bypassing the intended authorization mechanism. This flaw enables unauthenticated attackers to impersonate any WordPress user by directly invoking the REST endpoint with controlled parameters such as user_id, order_id, and context. Consequently, attackers can inject arbitrary messages into any WooCommerce order conversation, potentially misleading customers or administrators. The vulnerability impacts message integrity but does not compromise confidentiality or availability. The CVSS v3.1 base score is 4.3 (medium), reflecting the network attack vector, low attack complexity, requirement for some privileges (PR:L), no user interaction, and limited impact on integrity only. No patches or known exploits are currently available, but the vulnerability poses a risk to the trustworthiness of order communications in WooCommerce environments using this plugin.
Potential Impact
For European organizations, this vulnerability can undermine the integrity of order-related communications within WooCommerce, a widely used e-commerce platform. Attackers could inject misleading or fraudulent messages into order conversations, potentially causing confusion, fraud, or reputational damage. While the vulnerability does not directly expose sensitive data or disrupt service availability, the manipulation of order messages could facilitate social engineering attacks, customer dissatisfaction, or operational errors. E-commerce businesses relying on WooCommerce and this plugin may face increased risk of customer trust erosion and potential financial losses due to misinformation or fraudulent order communications. The impact is particularly relevant for organizations with high volumes of online transactions and customer interactions through WooCommerce order messaging.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting access to the vulnerable REST API endpoints by enforcing strict authentication and authorization checks at the web server or application firewall level. Administrators should verify nonce validation is properly enforced and consider disabling or limiting the use of the affected plugin until a patch is released. Monitoring REST API logs for unusual or unauthorized requests targeting order conversations can help detect exploitation attempts. Additionally, organizations should educate staff and customers to be vigilant for suspicious messages in order conversations. Once a vendor patch is released, prompt application of updates is critical. Reviewing and tightening WordPress user role permissions and REST API exposure can further reduce attack surface.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-13452: CWE-639 Authorization Bypass Through User-Controlled Key in nmedia Admin and Customer Messages After Order for WooCommerce: OrderConvo
Description
The Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 14. This is due to a flawed permission check in the REST API permission callback that returns true when no nonce is provided. This makes it possible for unauthenticated attackers to impersonate any WordPress user and inject arbitrary messages into any WooCommerce order conversation by directly calling the REST endpoint with controlled user_id, order_id, and context parameters.
AI-Powered Analysis
Technical Analysis
CVE-2025-13452 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress. The vulnerability exists in all versions up to and including version 14 due to a flawed permission check in the REST API permission callback. Specifically, the callback erroneously returns true when no nonce is provided, effectively bypassing the intended authorization mechanism. This flaw enables unauthenticated attackers to impersonate any WordPress user by directly invoking the REST endpoint with controlled parameters such as user_id, order_id, and context. Consequently, attackers can inject arbitrary messages into any WooCommerce order conversation, potentially misleading customers or administrators. The vulnerability impacts message integrity but does not compromise confidentiality or availability. The CVSS v3.1 base score is 4.3 (medium), reflecting the network attack vector, low attack complexity, requirement for some privileges (PR:L), no user interaction, and limited impact on integrity only. No patches or known exploits are currently available, but the vulnerability poses a risk to the trustworthiness of order communications in WooCommerce environments using this plugin.
Potential Impact
For European organizations, this vulnerability can undermine the integrity of order-related communications within WooCommerce, a widely used e-commerce platform. Attackers could inject misleading or fraudulent messages into order conversations, potentially causing confusion, fraud, or reputational damage. While the vulnerability does not directly expose sensitive data or disrupt service availability, the manipulation of order messages could facilitate social engineering attacks, customer dissatisfaction, or operational errors. E-commerce businesses relying on WooCommerce and this plugin may face increased risk of customer trust erosion and potential financial losses due to misinformation or fraudulent order communications. The impact is particularly relevant for organizations with high volumes of online transactions and customer interactions through WooCommerce order messaging.
Mitigation Recommendations
Since no official patch is currently available, European organizations should implement immediate compensating controls. These include restricting access to the vulnerable REST API endpoints by enforcing strict authentication and authorization checks at the web server or application firewall level. Administrators should verify nonce validation is properly enforced and consider disabling or limiting the use of the affected plugin until a patch is released. Monitoring REST API logs for unusual or unauthorized requests targeting order conversations can help detect exploitation attempts. Additionally, organizations should educate staff and customers to be vigilant for suspicious messages in order conversations. Once a vendor patch is released, prompt application of updates is critical. Reviewing and tightening WordPress user role permissions and REST API exposure can further reduce attack surface.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-19T19:28:16.353Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69255e2a292ce6fc00be0647
Added to database: 11/25/2025, 7:43:38 AM
Last enriched: 12/2/2025, 2:45:38 PM
Last updated: 1/10/2026, 10:16:20 PM
Views: 90
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.