CVE-2025-13457: CWE-639 Authorization Bypass Through User-Controlled Key in woocommerce WooCommerce Square
The WooCommerce Square plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.1 via the get_token_by_id function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to expose arbitrary Square "ccof" (credit card on file) values and leverage this value to potentially make fraudulent charges on the target site.
AI Analysis
Technical Summary
CVE-2025-13457 is an authorization bypass vulnerability categorized under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the WooCommerce Square plugin for WordPress. The vulnerability exists in all versions up to and including 5.1.1 due to insufficient validation in the get_token_by_id function. This function accepts a user-controlled key parameter that is not properly validated, allowing unauthenticated attackers to perform Insecure Direct Object Reference (IDOR) attacks. By manipulating this key, attackers can retrieve arbitrary Square 'ccof' (credit card on file) tokens associated with other users or customers. These tokens represent stored payment credentials that can be leveraged to make fraudulent charges on the affected WooCommerce site. The vulnerability does not require any authentication or user interaction, making it easier to exploit remotely over the network. The CVSS v3.1 base score is 7.5, reflecting high confidentiality impact but no impact on integrity or availability. Although no known exploits are currently reported in the wild, the potential for financial fraud and data exposure is significant. The vulnerability affects a wide range of WooCommerce Square versions from 4.2.0 through 5.1.0, which are commonly used in WordPress e-commerce deployments. The lack of patch links suggests that fixes may be pending or not yet publicly released, emphasizing the need for vigilance and interim mitigations.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of stored payment information and the financial integrity of their e-commerce operations. Unauthorized access to Square credit card on file tokens can lead to fraudulent transactions, financial losses, chargebacks, and reputational damage. Given the widespread use of WooCommerce in Europe, especially among small to medium-sized online retailers, exploitation could disrupt business operations and erode customer trust. The vulnerability does not affect system availability or data integrity directly but compromises sensitive payment data confidentiality. Regulatory implications under GDPR are also critical, as exposure of payment data constitutes a personal data breach requiring notification and potential penalties. The ease of exploitation without authentication or user interaction increases the threat level, making it attractive for financially motivated attackers. Organizations relying on WooCommerce Square for payment processing must consider this vulnerability a high priority to address to avoid financial and compliance repercussions.
Mitigation Recommendations
1. Monitor official WooCommerce and Square plugin channels for security patches addressing CVE-2025-13457 and apply updates immediately upon release. 2. Until patches are available, implement strict access controls on the get_token_by_id API endpoint, such as IP whitelisting or requiring authentication tokens to restrict access. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to manipulate user-controlled keys or access unauthorized tokens. 4. Conduct thorough logging and monitoring of API calls related to payment token retrieval to identify anomalous patterns indicative of exploitation attempts. 5. Review and audit all third-party plugins and integrations to ensure they follow secure coding practices, especially regarding authorization checks. 6. Educate development and security teams about the risks of IDOR vulnerabilities and enforce secure coding standards to prevent similar issues. 7. Consider temporarily disabling the WooCommerce Square plugin if immediate patching is not feasible and alternative payment methods are available. 8. Prepare incident response plans specifically for payment data breaches, including customer notification procedures and coordination with payment processors.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden
CVE-2025-13457: CWE-639 Authorization Bypass Through User-Controlled Key in woocommerce WooCommerce Square
Description
The WooCommerce Square plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.1 via the get_token_by_id function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to expose arbitrary Square "ccof" (credit card on file) values and leverage this value to potentially make fraudulent charges on the target site.
AI-Powered Analysis
Technical Analysis
CVE-2025-13457 is an authorization bypass vulnerability categorized under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the WooCommerce Square plugin for WordPress. The vulnerability exists in all versions up to and including 5.1.1 due to insufficient validation in the get_token_by_id function. This function accepts a user-controlled key parameter that is not properly validated, allowing unauthenticated attackers to perform Insecure Direct Object Reference (IDOR) attacks. By manipulating this key, attackers can retrieve arbitrary Square 'ccof' (credit card on file) tokens associated with other users or customers. These tokens represent stored payment credentials that can be leveraged to make fraudulent charges on the affected WooCommerce site. The vulnerability does not require any authentication or user interaction, making it easier to exploit remotely over the network. The CVSS v3.1 base score is 7.5, reflecting high confidentiality impact but no impact on integrity or availability. Although no known exploits are currently reported in the wild, the potential for financial fraud and data exposure is significant. The vulnerability affects a wide range of WooCommerce Square versions from 4.2.0 through 5.1.0, which are commonly used in WordPress e-commerce deployments. The lack of patch links suggests that fixes may be pending or not yet publicly released, emphasizing the need for vigilance and interim mitigations.
Potential Impact
For European organizations, this vulnerability poses a significant risk to the confidentiality of stored payment information and the financial integrity of their e-commerce operations. Unauthorized access to Square credit card on file tokens can lead to fraudulent transactions, financial losses, chargebacks, and reputational damage. Given the widespread use of WooCommerce in Europe, especially among small to medium-sized online retailers, exploitation could disrupt business operations and erode customer trust. The vulnerability does not affect system availability or data integrity directly but compromises sensitive payment data confidentiality. Regulatory implications under GDPR are also critical, as exposure of payment data constitutes a personal data breach requiring notification and potential penalties. The ease of exploitation without authentication or user interaction increases the threat level, making it attractive for financially motivated attackers. Organizations relying on WooCommerce Square for payment processing must consider this vulnerability a high priority to address to avoid financial and compliance repercussions.
Mitigation Recommendations
1. Monitor official WooCommerce and Square plugin channels for security patches addressing CVE-2025-13457 and apply updates immediately upon release. 2. Until patches are available, implement strict access controls on the get_token_by_id API endpoint, such as IP whitelisting or requiring authentication tokens to restrict access. 3. Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests attempting to manipulate user-controlled keys or access unauthorized tokens. 4. Conduct thorough logging and monitoring of API calls related to payment token retrieval to identify anomalous patterns indicative of exploitation attempts. 5. Review and audit all third-party plugins and integrations to ensure they follow secure coding practices, especially regarding authorization checks. 6. Educate development and security teams about the risks of IDOR vulnerabilities and enforce secure coding standards to prevent similar issues. 7. Consider temporarily disabling the WooCommerce Square plugin if immediate patching is not feasible and alternative payment methods are available. 8. Prepare incident response plans specifically for payment data breaches, including customer notification procedures and coordination with payment processors.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-19T20:13:41.577Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6961cb1719784dcf52be20ce
Added to database: 1/10/2026, 3:44:23 AM
Last enriched: 1/17/2026, 7:54:22 AM
Last updated: 2/4/2026, 1:30:25 AM
Views: 224
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1835: Cross-Site Request Forgery in lcg0124 BootDo
MediumCVE-2026-1813: Unrestricted Upload in bolo-blog bolo-solo
MediumCVE-2026-1632: CWE-306 Missing Authentication for Critical Function in RISS SRL MOMA Seismic Station
CriticalCVE-2026-1812: Path Traversal in bolo-blog bolo-solo
MediumCVE-2026-24514: CWE-770 Allocation of Resources Without Limits or Throttling in Kubernetes ingress-nginx
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.