CVE-2025-13526: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in walterpinem OneClick Chat to Order
The OneClick Chat to Order plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.8 via the 'wa_order_thank_you_override' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view sensitive customer information including names, email addresses, phone numbers, billing/shipping addresses, order contents, and payment methods by simply changing the order ID in the URL.
AI Analysis
Technical Summary
CVE-2025-13526 is an Insecure Direct Object Reference (IDOR) vulnerability identified in the OneClick Chat to Order plugin for WordPress, affecting all versions up to and including 1.0.8. The vulnerability exists due to the 'wa_order_thank_you_override' function failing to validate user-controlled input, specifically the order ID parameter in the URL. This lack of validation enables unauthenticated attackers to manipulate the order ID and retrieve sensitive customer information without any authentication or user interaction. The exposed data includes personally identifiable information (PII) such as customer names, email addresses, phone numbers, billing and shipping addresses, order contents, and payment methods. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required, resulting in a high confidentiality impact but no impact on integrity or availability. While no public exploits have been reported yet, the flaw represents a significant risk for data leakage. The vulnerability is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and has a CVSS v3.1 base score of 7.5, indicating a high severity level. The absence of patches at the time of disclosure necessitates immediate attention from administrators to implement compensating controls or disable the plugin until a fix is available.
Potential Impact
For European organizations, this vulnerability poses a substantial risk of unauthorized disclosure of sensitive customer data, which can lead to privacy violations, reputational damage, and regulatory penalties under GDPR. The exposure of PII and payment information can facilitate identity theft, fraud, and targeted phishing attacks. E-commerce businesses relying on the OneClick Chat to Order plugin may suffer customer trust erosion and potential financial losses. Since the vulnerability requires no authentication or user interaction, attackers can easily automate exploitation at scale, increasing the likelihood of widespread data breaches. Additionally, organizations may face legal consequences due to non-compliance with data protection laws, especially if they fail to secure customer data adequately. The impact is particularly critical for sectors handling large volumes of customer transactions, such as retail, travel, and services industries prevalent in Europe.
Mitigation Recommendations
1. Immediately audit WordPress sites to identify installations of the OneClick Chat to Order plugin and verify the version in use. 2. Disable or uninstall the plugin until an official security patch is released by the vendor. 3. If disabling the plugin is not feasible, implement web application firewall (WAF) rules to block or monitor requests containing suspicious order ID manipulations targeting the 'wa_order_thank_you_override' function. 4. Restrict access to order-related URLs by enforcing authentication and authorization checks at the web server or application level. 5. Monitor server logs for unusual access patterns or repeated attempts to access order details with varying order IDs. 6. Educate site administrators on the risks of insecure direct object references and encourage timely updates of all plugins. 7. Once a patch is available, apply it promptly and verify that proper input validation and access controls are enforced. 8. Conduct regular security assessments and penetration testing focusing on IDOR and other access control vulnerabilities in e-commerce plugins.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-13526: CWE-200 Exposure of Sensitive Information to an Unauthorized Actor in walterpinem OneClick Chat to Order
Description
The OneClick Chat to Order plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.8 via the 'wa_order_thank_you_override' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view sensitive customer information including names, email addresses, phone numbers, billing/shipping addresses, order contents, and payment methods by simply changing the order ID in the URL.
AI-Powered Analysis
Technical Analysis
CVE-2025-13526 is an Insecure Direct Object Reference (IDOR) vulnerability identified in the OneClick Chat to Order plugin for WordPress, affecting all versions up to and including 1.0.8. The vulnerability exists due to the 'wa_order_thank_you_override' function failing to validate user-controlled input, specifically the order ID parameter in the URL. This lack of validation enables unauthenticated attackers to manipulate the order ID and retrieve sensitive customer information without any authentication or user interaction. The exposed data includes personally identifiable information (PII) such as customer names, email addresses, phone numbers, billing and shipping addresses, order contents, and payment methods. The vulnerability is remotely exploitable over the network with low attack complexity and no privileges required, resulting in a high confidentiality impact but no impact on integrity or availability. While no public exploits have been reported yet, the flaw represents a significant risk for data leakage. The vulnerability is categorized under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor) and has a CVSS v3.1 base score of 7.5, indicating a high severity level. The absence of patches at the time of disclosure necessitates immediate attention from administrators to implement compensating controls or disable the plugin until a fix is available.
Potential Impact
For European organizations, this vulnerability poses a substantial risk of unauthorized disclosure of sensitive customer data, which can lead to privacy violations, reputational damage, and regulatory penalties under GDPR. The exposure of PII and payment information can facilitate identity theft, fraud, and targeted phishing attacks. E-commerce businesses relying on the OneClick Chat to Order plugin may suffer customer trust erosion and potential financial losses. Since the vulnerability requires no authentication or user interaction, attackers can easily automate exploitation at scale, increasing the likelihood of widespread data breaches. Additionally, organizations may face legal consequences due to non-compliance with data protection laws, especially if they fail to secure customer data adequately. The impact is particularly critical for sectors handling large volumes of customer transactions, such as retail, travel, and services industries prevalent in Europe.
Mitigation Recommendations
1. Immediately audit WordPress sites to identify installations of the OneClick Chat to Order plugin and verify the version in use. 2. Disable or uninstall the plugin until an official security patch is released by the vendor. 3. If disabling the plugin is not feasible, implement web application firewall (WAF) rules to block or monitor requests containing suspicious order ID manipulations targeting the 'wa_order_thank_you_override' function. 4. Restrict access to order-related URLs by enforcing authentication and authorization checks at the web server or application level. 5. Monitor server logs for unusual access patterns or repeated attempts to access order details with varying order IDs. 6. Educate site administrators on the risks of insecure direct object references and encourage timely updates of all plugins. 7. Once a patch is available, apply it promptly and verify that proper input validation and access controls are enforced. 8. Conduct regular security assessments and penetration testing focusing on IDOR and other access control vulnerabilities in e-commerce plugins.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-21T19:46:22.700Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69219bd9de5ac9d38c932d9b
Added to database: 11/22/2025, 11:17:45 AM
Last enriched: 11/22/2025, 11:32:39 AM
Last updated: 11/22/2025, 1:14:28 PM
Views: 6
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-0401: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in ASUS ExpertWiFi
HighCVE-2024-23690: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Netgear FVS336Gv3
HighCVE-2024-13976: CWE-427 Uncontrolled Search Path Element in Commvault Commvault for Windows
HighCVE-2024-12856: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Four-Faith F3x24
HighCVE-2025-13318: CWE-862 Missing Authorization in codepeople Booking Calendar Contact Form
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.