Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-13526: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in walterpinem OneClick Chat to Order

0
High
VulnerabilityCVE-2025-13526cvecve-2025-13526cwe-200
Published: Sat Nov 22 2025 (11/22/2025, 11:08:38 UTC)
Source: CVE Database V5
Vendor/Project: walterpinem
Product: OneClick Chat to Order

Description

The OneClick Chat to Order plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.8 via the 'wa_order_thank_you_override' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view sensitive customer information including names, email addresses, phone numbers, billing/shipping addresses, order contents, and payment methods by simply changing the order ID in the URL.

AI-Powered Analysis

AILast updated: 11/29/2025, 11:39:46 UTC

Technical Analysis

CVE-2025-13526 is a vulnerability classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) affecting the OneClick Chat to Order plugin for WordPress, specifically versions up to and including 1.0.8. The vulnerability arises from an Insecure Direct Object Reference (IDOR) in the 'wa_order_thank_you_override' function, where the plugin fails to validate a user-controlled key parameter that corresponds to the order ID. This lack of validation allows unauthenticated attackers to manipulate the order ID parameter in the URL to access sensitive customer data associated with other orders. The exposed data includes personally identifiable information (PII) such as customer names, email addresses, phone numbers, billing and shipping addresses, order contents, and payment method details. The vulnerability can be exploited remotely without any authentication or user interaction, making it highly accessible to attackers scanning for vulnerable sites. Although no known exploits are currently in the wild, the vulnerability's nature and ease of exploitation make it a critical privacy and security concern. The CVSS v3.1 base score of 7.5 reflects the network attack vector, low attack complexity, no privileges required, no user interaction, and a high impact on confidentiality, with no impact on integrity or availability. The vulnerability was published on November 22, 2025, and is assigned by Wordfence. No official patches or fixes have been linked yet, indicating that affected sites remain vulnerable until updates are released and applied.

Potential Impact

For European organizations, the exposure of sensitive customer information through this vulnerability can lead to severe privacy breaches, undermining customer trust and damaging brand reputation. The leakage of PII and payment details can facilitate identity theft, fraud, and targeted phishing attacks. Additionally, under the EU General Data Protection Regulation (GDPR), unauthorized disclosure of personal data can result in substantial fines and legal consequences. E-commerce businesses relying on the OneClick Chat to Order plugin are particularly at risk, as customer order data is central to their operations. The vulnerability does not affect system integrity or availability directly but compromises confidentiality, which is critical for compliance and customer trust. Organizations may also face operational disruptions if they need to take vulnerable systems offline or conduct extensive incident response. The risk is heightened for businesses with large customer bases or those handling sensitive payment information. The lack of authentication and user interaction requirements means attackers can exploit the flaw at scale, increasing the potential impact across multiple organizations.

Mitigation Recommendations

European organizations should immediately audit their WordPress installations to identify the presence of the OneClick Chat to Order plugin and its version. Until an official patch is released, organizations should consider disabling or removing the plugin to prevent exploitation. Implementing web application firewall (WAF) rules to detect and block suspicious requests attempting to manipulate order ID parameters can provide temporary protection. Restricting access to order-related URLs by IP whitelisting or requiring authentication can also mitigate risk. Developers and site administrators should enforce strict input validation and authorization checks on all user-supplied parameters, ensuring that users can only access their own order data. Monitoring web server logs for unusual access patterns targeting order IDs can help detect exploitation attempts. Once a patch is available, prompt application and testing of the update is critical. Additionally, organizations should review their data protection policies and incident response plans to prepare for potential data breach notifications and compliance requirements.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-21T19:46:22.700Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69219bd9de5ac9d38c932d9b

Added to database: 11/22/2025, 11:17:45 AM

Last enriched: 11/29/2025, 11:39:46 AM

Last updated: 1/7/2026, 4:54:17 AM

Views: 95

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats