Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13452: CWE-639 Authorization Bypass Through User-Controlled Key in nmedia Admin and Customer Messages After Order for WooCommerce: OrderConvo

0
Medium
VulnerabilityCVE-2025-13452cvecve-2025-13452cwe-639
Published: Tue Nov 25 2025 (11/25/2025, 07:28:20 UTC)
Source: CVE Database V5
Vendor/Project: nmedia
Product: Admin and Customer Messages After Order for WooCommerce: OrderConvo

Description

The Admin and Customer Messages After Order for WooCommerce: OrderConvo plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 14. This is due to a flawed permission check in the REST API permission callback that returns true when no nonce is provided. This makes it possible for unauthenticated attackers to impersonate any WordPress user and inject arbitrary messages into any WooCommerce order conversation by directly calling the REST endpoint with controlled user_id, order_id, and context parameters.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 09:53:10 UTC

Technical Analysis

CVE-2025-13452 is a vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the 'Admin and Customer Messages After Order for WooCommerce: OrderConvo' plugin for WordPress. This plugin facilitates communication between admins and customers post-order via WooCommerce. The vulnerability arises from a flawed permission check in the REST API permission callback function, which incorrectly returns true when no nonce (a security token to verify request authenticity) is provided. This missing authorization check allows unauthenticated attackers to craft REST API requests with controlled parameters such as user_id, order_id, and context, enabling them to impersonate any WordPress user. Consequently, attackers can inject arbitrary messages into any order conversation, potentially misleading customers or admins. The vulnerability affects all versions up to and including version 14 of the plugin. The CVSS v3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires low attack complexity, but requires some privileges (PR:L) and no user interaction. The impact is limited to integrity as confidentiality and availability are not affected. No patches or exploits are currently reported, but the vulnerability poses a risk of unauthorized message injection that could be leveraged for social engineering or fraud within e-commerce communications.

Potential Impact

The primary impact of CVE-2025-13452 is the unauthorized modification of order-related messages within WooCommerce stores using the vulnerable plugin. Attackers can impersonate legitimate users and inject misleading or fraudulent messages into order conversations, potentially deceiving customers or administrators. This can lead to social engineering attacks, fraud, reputational damage, and loss of customer trust. Although the vulnerability does not directly compromise confidentiality or availability, the integrity breach can facilitate further attacks such as phishing or payment diversion scams. Organizations relying on WooCommerce and this plugin for customer communication are at risk of manipulation of order data, which can disrupt business operations and customer relations. The vulnerability's exploitation requires no user interaction and can be performed remotely, increasing its risk profile. However, the requirement for some privileges (PR:L) may limit exploitation to environments where attackers have limited access or can bypass authentication mechanisms. Overall, the threat is significant for e-commerce businesses using this plugin, especially those with high transaction volumes and customer interactions.

Mitigation Recommendations

To mitigate CVE-2025-13452, organizations should immediately update the 'Admin and Customer Messages After Order for WooCommerce: OrderConvo' plugin to a patched version once available. Until a patch is released, administrators should consider disabling the plugin or restricting access to the REST API endpoints related to order conversations via web application firewalls or custom access controls. Implementing strict nonce verification and permission checks in the REST API callbacks is critical to prevent unauthorized access. Monitoring REST API logs for suspicious requests with manipulated user_id, order_id, or context parameters can help detect exploitation attempts. Additionally, applying the principle of least privilege to WordPress user roles and limiting plugin usage to trusted administrators reduces risk. Organizations should educate staff about potential social engineering risks arising from unauthorized message injection. Regular security audits and vulnerability scanning of WordPress plugins can help identify similar issues proactively. Finally, maintaining comprehensive backups of WooCommerce data ensures recovery in case of data integrity compromise.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-19T19:28:16.353Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69255e2a292ce6fc00be0647

Added to database: 11/25/2025, 7:43:38 AM

Last enriched: 2/27/2026, 9:53:10 AM

Last updated: 3/24/2026, 3:36:11 AM

Views: 141

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses