CVE-2025-14365: CWE-862 Missing Authorization in dugudlabs Eyewear prescription form
The Eyewear prescription form plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.0.1. This is due to missing capability checks on the RemoveItems AJAX action. This makes it possible for unauthenticated attackers to delete arbitrary WooCommerce product categories, including all of their child categories, via the 'catIds' parameter.
AI Analysis
Technical Summary
CVE-2025-14365 is a vulnerability classified under CWE-862 (Missing Authorization) found in the dugudlabs Eyewear prescription form plugin for WordPress, affecting all versions up to and including 6.0.1. The root cause is the absence of proper capability checks on the RemoveItems AJAX action endpoint. This flaw allows unauthenticated attackers to invoke this AJAX action and supply arbitrary 'catIds' parameters, which correspond to WooCommerce product category IDs. Consequently, attackers can delete any product category, including all nested child categories, without any authentication or user interaction. This unauthorized deletion compromises the integrity of the e-commerce product catalog, potentially disrupting business operations and causing loss of product data organization. The vulnerability does not affect confidentiality or availability directly, as it does not expose sensitive data or cause denial of service. The CVSS 3.1 base score is 5.3, indicating medium severity, with attack vector Network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to integrity (I:L). No patches or official fixes have been published at the time of disclosure, and no active exploitation has been reported. The vulnerability is particularly relevant for WordPress sites using both the dugudlabs Eyewear prescription form plugin and WooCommerce, a common e-commerce platform. Attackers could leverage this flaw to disrupt product listings, confuse customers, and potentially cause financial losses by deleting product categories critical to sales and inventory management.
Potential Impact
For European organizations, especially those operating e-commerce websites using WordPress with the dugudlabs Eyewear prescription form plugin and WooCommerce, this vulnerability poses a significant risk to data integrity. Unauthorized deletion of product categories can lead to operational disruptions, loss of sales, and damage to brand reputation. While it does not expose sensitive customer data or cause service outages, the ability to manipulate product categories without authentication can undermine trust and complicate inventory management. This is particularly impactful for medium to large online retailers who rely heavily on structured product categorization for customer navigation and sales analytics. Additionally, recovery from such unauthorized deletions may require manual restoration from backups, increasing downtime and operational costs. The absence of known exploits in the wild reduces immediate risk, but the ease of exploitation and lack of authentication requirements make it a viable target for opportunistic attackers. European organizations must consider the potential for targeted attacks aimed at disrupting e-commerce operations, especially during peak sales periods.
Mitigation Recommendations
To mitigate CVE-2025-14365, organizations should implement the following specific measures: 1) Immediately audit and restrict access to the RemoveItems AJAX action by enforcing strict capability checks to ensure only authorized users can perform category deletions. 2) If possible, disable or remove the dugudlabs Eyewear prescription form plugin until a patch is available, especially on sites where it is not critical. 3) Monitor WooCommerce product category deletions and related logs for unusual or unauthorized activity, setting up alerts for unexpected removals. 4) Employ web application firewalls (WAFs) with custom rules to block unauthenticated requests targeting the vulnerable AJAX endpoint. 5) Regularly back up WooCommerce product data and test restoration procedures to minimize downtime in case of data loss. 6) Stay informed about vendor updates and apply patches promptly once released. 7) Consider implementing additional authentication or multi-factor verification for administrative AJAX actions to reduce risk. 8) Review and tighten WordPress user roles and permissions to limit exposure. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vector.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Sweden
CVE-2025-14365: CWE-862 Missing Authorization in dugudlabs Eyewear prescription form
Description
The Eyewear prescription form plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.0.1. This is due to missing capability checks on the RemoveItems AJAX action. This makes it possible for unauthenticated attackers to delete arbitrary WooCommerce product categories, including all of their child categories, via the 'catIds' parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-14365 is a vulnerability classified under CWE-862 (Missing Authorization) found in the dugudlabs Eyewear prescription form plugin for WordPress, affecting all versions up to and including 6.0.1. The root cause is the absence of proper capability checks on the RemoveItems AJAX action endpoint. This flaw allows unauthenticated attackers to invoke this AJAX action and supply arbitrary 'catIds' parameters, which correspond to WooCommerce product category IDs. Consequently, attackers can delete any product category, including all nested child categories, without any authentication or user interaction. This unauthorized deletion compromises the integrity of the e-commerce product catalog, potentially disrupting business operations and causing loss of product data organization. The vulnerability does not affect confidentiality or availability directly, as it does not expose sensitive data or cause denial of service. The CVSS 3.1 base score is 5.3, indicating medium severity, with attack vector Network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to integrity (I:L). No patches or official fixes have been published at the time of disclosure, and no active exploitation has been reported. The vulnerability is particularly relevant for WordPress sites using both the dugudlabs Eyewear prescription form plugin and WooCommerce, a common e-commerce platform. Attackers could leverage this flaw to disrupt product listings, confuse customers, and potentially cause financial losses by deleting product categories critical to sales and inventory management.
Potential Impact
For European organizations, especially those operating e-commerce websites using WordPress with the dugudlabs Eyewear prescription form plugin and WooCommerce, this vulnerability poses a significant risk to data integrity. Unauthorized deletion of product categories can lead to operational disruptions, loss of sales, and damage to brand reputation. While it does not expose sensitive customer data or cause service outages, the ability to manipulate product categories without authentication can undermine trust and complicate inventory management. This is particularly impactful for medium to large online retailers who rely heavily on structured product categorization for customer navigation and sales analytics. Additionally, recovery from such unauthorized deletions may require manual restoration from backups, increasing downtime and operational costs. The absence of known exploits in the wild reduces immediate risk, but the ease of exploitation and lack of authentication requirements make it a viable target for opportunistic attackers. European organizations must consider the potential for targeted attacks aimed at disrupting e-commerce operations, especially during peak sales periods.
Mitigation Recommendations
To mitigate CVE-2025-14365, organizations should implement the following specific measures: 1) Immediately audit and restrict access to the RemoveItems AJAX action by enforcing strict capability checks to ensure only authorized users can perform category deletions. 2) If possible, disable or remove the dugudlabs Eyewear prescription form plugin until a patch is available, especially on sites where it is not critical. 3) Monitor WooCommerce product category deletions and related logs for unusual or unauthorized activity, setting up alerts for unexpected removals. 4) Employ web application firewalls (WAFs) with custom rules to block unauthenticated requests targeting the vulnerable AJAX endpoint. 5) Regularly back up WooCommerce product data and test restoration procedures to minimize downtime in case of data loss. 6) Stay informed about vendor updates and apply patches promptly once released. 7) Consider implementing additional authentication or multi-factor verification for administrative AJAX actions to reduce risk. 8) Review and tighten WordPress user roles and permissions to limit exposure. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vector.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-09T18:23:53.612Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693cef64d977419e584a5026
Added to database: 12/13/2025, 4:45:24 AM
Last enriched: 12/13/2025, 5:04:24 AM
Last updated: 12/15/2025, 1:39:17 AM
Views: 23
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14695: Dynamically-Managed Code Resources in SamuNatsu HaloBot
MediumCVE-2025-14694: SQL Injection in ketr JEPaaS
MediumCVE-2025-14693: Symlink Following in Ugreen DH2100+
HighCVE-2025-67901: CWE-1284 Improper Validation of Specified Quantity in Input in kristapsdz openrsync
MediumCVE-2025-14692: Open Redirect in Mayan EDMS
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.