Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13526: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in walterpinem OneClick Chat to Order

0
High
VulnerabilityCVE-2025-13526cvecve-2025-13526cwe-200
Published: Sat Nov 22 2025 (11/22/2025, 11:08:38 UTC)
Source: CVE Database V5
Vendor/Project: walterpinem
Product: OneClick Chat to Order

Description

The OneClick Chat to Order plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.8 via the 'wa_order_thank_you_override' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view sensitive customer information including names, email addresses, phone numbers, billing/shipping addresses, order contents, and payment methods by simply changing the order ID in the URL.

AI-Powered Analysis

AILast updated: 11/22/2025, 11:32:39 UTC

Technical Analysis

CVE-2025-13526 is an Insecure Direct Object Reference (IDOR) vulnerability identified in the OneClick Chat to Order plugin for WordPress, affecting all versions up to and including 1.0.8. The vulnerability exists due to the 'wa_order_thank_you_override' function failing to validate user-controlled input, specifically the order ID parameter in the URL. This lack of validation enables unauthenticated attackers to manipulate the order ID and retrieve sensitive customer information without any authentication or user interaction. The exposed data includes personally identifiable information (PII) such as customer names, email addresses, phone numbers, billing and shipping addresses, order contents, and payment methods. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required, resulting in a high confidentiality impact but no impact on integrity or availability. While no public exploits have been reported yet, the flaw represents a significant risk for data leakage. The vulnerability is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and has a CVSS v3.1 base score of 7.5, indicating a high severity level. The absence of patches at the time of disclosure necessitates immediate attention from administrators to implement compensating controls or disable the plugin until a fix is available.

Potential Impact

For European organizations, this vulnerability poses a substantial risk of unauthorized disclosure of sensitive customer data, which can lead to privacy violations, reputational damage, and regulatory penalties under GDPR. The exposure of PII and payment information can facilitate identity theft, fraud, and targeted phishing attacks. E-commerce businesses relying on the OneClick Chat to Order plugin may suffer customer trust erosion and potential financial losses. Since the vulnerability requires no authentication or user interaction, attackers can easily automate exploitation at scale, increasing the likelihood of widespread data breaches. Additionally, organizations may face legal consequences due to non-compliance with data protection laws, especially if they fail to secure customer data adequately. The impact is particularly critical for sectors handling large volumes of customer transactions, such as retail, travel, and services industries prevalent in Europe.

Mitigation Recommendations

1. Immediately audit WordPress sites to identify installations of the OneClick Chat to Order plugin and verify the version in use. 2. Disable or uninstall the plugin until an official security patch is released by the vendor. 3. If disabling the plugin is not feasible, implement web application firewall (WAF) rules to block or monitor requests containing suspicious order ID manipulations targeting the 'wa_order_thank_you_override' function. 4. Restrict access to order-related URLs by enforcing authentication and authorization checks at the web server or application level. 5. Monitor server logs for unusual access patterns or repeated attempts to access order details with varying order IDs. 6. Educate site administrators on the risks of insecure direct object references and encourage timely updates of all plugins. 7. Once a patch is available, apply it promptly and verify that proper input validation and access controls are enforced. 8. Conduct regular security assessments and penetration testing focusing on IDOR and other access control vulnerabilities in e-commerce plugins.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-21T19:46:22.700Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69219bd9de5ac9d38c932d9b

Added to database: 11/22/2025, 11:17:45 AM

Last enriched: 11/22/2025, 11:32:39 AM

Last updated: 11/22/2025, 1:14:28 PM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats