Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14173: CWE-862 Missing Authorization in perfitdev Perfit WooCommerce

0
Medium
VulnerabilityCVE-2025-14173cvecve-2025-14173cwe-862
Published: Wed Jan 14 2026 (01/14/2026, 06:40:07 UTC)
Source: CVE Database V5
Vendor/Project: perfitdev
Product: Perfit WooCommerce

Description

The Perfit WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.0.1. This is due to missing authorization checks on the `logout` function called via the `actions` function hooked to `admin_init`. This makes it possible for unauthenticated attackers to delete arbitrary plugin settings via the `action` parameter.

AI-Powered Analysis

AILast updated: 01/14/2026, 07:20:03 UTC

Technical Analysis

CVE-2025-14173 identifies a Missing Authorization vulnerability (CWE-862) in the Perfit WooCommerce plugin for WordPress, affecting all versions up to and including 1.0.1. The vulnerability arises because the plugin's logout function, which is invoked via the actions function hooked to the WordPress admin_init action, lacks proper authorization checks. This flaw allows unauthenticated attackers to invoke the logout function by manipulating the 'action' parameter in HTTP requests. As a result, attackers can delete arbitrary plugin settings without any authentication or user interaction. The vulnerability impacts the integrity of the plugin's configuration data but does not affect confidentiality or availability directly. The CVSS v3.1 base score is 5.3, reflecting network exploitability without privileges or user interaction, and limited impact on integrity only. No patches or known exploits are currently available, indicating the vulnerability is newly disclosed. The technical root cause is the absence of authorization validation in the plugin's admin_init hook processing, which should restrict sensitive operations to authorized administrators only. This vulnerability could be exploited remotely by sending crafted requests to the WordPress site hosting the vulnerable plugin, potentially disrupting e-commerce functionality by deleting critical plugin settings. Organizations using Perfit WooCommerce should assess their exposure and implement compensating controls until an official patch is released.

Potential Impact

For European organizations, this vulnerability poses a moderate risk primarily to the integrity of e-commerce operations relying on the Perfit WooCommerce plugin. Unauthorized deletion of plugin settings could lead to misconfiguration, loss of customizations, or disruption of checkout and payment workflows, potentially causing financial losses and customer dissatisfaction. While confidentiality and availability are not directly impacted, the integrity compromise could indirectly affect availability if critical settings are removed or altered. Organizations with high transaction volumes or those operating in regulated sectors (e.g., retail, finance) may face compliance risks if e-commerce functionality is impaired. The ease of exploitation (no authentication or user interaction required) increases the likelihood of opportunistic attacks, especially if the plugin is widely deployed. European businesses using WordPress and WooCommerce should consider this vulnerability a significant operational risk until mitigated. The absence of known exploits in the wild provides a window for proactive defense, but the lack of patches necessitates immediate attention to alternative protective measures.

Mitigation Recommendations

1. Immediately restrict access to the WordPress admin_init hook and any endpoints processing the 'action' parameter related to the Perfit WooCommerce plugin, using web application firewalls (WAF) or server-level access controls. 2. Implement manual authorization checks in the plugin code or via custom hooks to ensure only authenticated administrators can invoke sensitive functions like logout or settings deletion. 3. Monitor web server and application logs for unusual or repeated requests containing the 'action' parameter targeting the plugin, indicating potential exploitation attempts. 4. Disable or uninstall the Perfit WooCommerce plugin if it is not critical to business operations until an official patch is released. 5. Keep WordPress core and all plugins updated and subscribe to vendor security advisories for timely patch deployment. 6. Employ security plugins that can detect and block unauthorized access attempts to admin functions. 7. Conduct regular backups of plugin settings and site configurations to enable rapid restoration if unauthorized changes occur. 8. Educate site administrators about this vulnerability and encourage vigilance for suspicious site behavior. 9. Coordinate with hosting providers to apply network-level protections and monitoring. 10. Prepare incident response plans specifically addressing unauthorized configuration changes in e-commerce plugins.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-05T22:13:26.091Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69673f948330e06716b84f77

Added to database: 1/14/2026, 7:02:44 AM

Last enriched: 1/14/2026, 7:20:03 AM

Last updated: 1/14/2026, 4:43:24 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats