CVE-2025-14365: CWE-862 Missing Authorization in dugudlabs Eyewear prescription form
The Eyewear prescription form plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.0.1. This is due to missing capability checks on the RemoveItems AJAX action. This makes it possible for unauthenticated attackers to delete arbitrary WooCommerce product categories, including all of their child categories, via the 'catIds' parameter.
AI Analysis
Technical Summary
CVE-2025-14365 identifies a missing authorization vulnerability (CWE-862) in the dugudlabs Eyewear prescription form plugin for WordPress, present in all versions up to and including 6.0.1. The vulnerability arises because the RemoveItems AJAX action lacks proper capability checks, allowing unauthenticated users to invoke this action remotely. By exploiting this flaw, an attacker can supply arbitrary category IDs via the 'catIds' parameter to delete WooCommerce product categories and all their child categories. This unauthorized deletion compromises the integrity of the e-commerce data, potentially disrupting product catalogs and sales operations. The vulnerability has a CVSS 3.1 base score of 5.3 (medium severity), reflecting its network attack vector, no required privileges or user interaction, and limited impact confined to integrity without affecting confidentiality or availability. No patches or mitigations have been officially released by dugudlabs at the time of disclosure, and no known exploits have been reported in the wild. The vulnerability is particularly concerning for WordPress sites using WooCommerce and this plugin, as it could lead to significant business impact through loss of product data and customer trust. The lack of authorization checks is a critical security oversight that should be addressed promptly by plugin developers and site administrators.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to e-commerce websites using WordPress with WooCommerce and the dugudlabs Eyewear prescription form plugin. The unauthorized deletion of product categories can lead to significant operational disruption, loss of sales, and damage to brand reputation. While it does not expose sensitive customer data or cause denial of service, the integrity compromise can result in downtime during recovery and potential financial losses. Retailers and service providers relying on accurate product categorization for customer navigation and inventory management are especially vulnerable. The ease of exploitation without authentication increases the risk of opportunistic attacks or automated scanning by malicious actors. This threat could also facilitate further attacks by creating confusion or gaps in product offerings, indirectly affecting customer trust and compliance with e-commerce regulations in Europe. Organizations may face challenges in quickly restoring deleted categories if backups are not current or comprehensive.
Mitigation Recommendations
Until an official patch is released by dugudlabs, European organizations should implement the following mitigations: 1) Immediately disable or restrict access to the RemoveItems AJAX action in the plugin code by adding proper capability checks or limiting it to authenticated administrators only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the 'catIds' parameter or the RemoveItems action. 3) Regularly back up WooCommerce product categories and related data to enable rapid restoration in case of unauthorized deletions. 4) Monitor web server and application logs for unusual AJAX activity or repeated requests to the vulnerable endpoint. 5) Consider temporarily disabling the dugudlabs Eyewear prescription form plugin if it is not critical to business operations. 6) Stay alert for vendor updates and apply patches promptly once available. 7) Conduct security audits of all WordPress plugins to identify and remediate similar missing authorization issues proactively.
Affected Countries
Germany, United Kingdom, France, Italy, Spain, Netherlands, Sweden
CVE-2025-14365: CWE-862 Missing Authorization in dugudlabs Eyewear prescription form
Description
The Eyewear prescription form plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.0.1. This is due to missing capability checks on the RemoveItems AJAX action. This makes it possible for unauthenticated attackers to delete arbitrary WooCommerce product categories, including all of their child categories, via the 'catIds' parameter.
AI-Powered Analysis
Technical Analysis
CVE-2025-14365 identifies a missing authorization vulnerability (CWE-862) in the dugudlabs Eyewear prescription form plugin for WordPress, present in all versions up to and including 6.0.1. The vulnerability arises because the RemoveItems AJAX action lacks proper capability checks, allowing unauthenticated users to invoke this action remotely. By exploiting this flaw, an attacker can supply arbitrary category IDs via the 'catIds' parameter to delete WooCommerce product categories and all their child categories. This unauthorized deletion compromises the integrity of the e-commerce data, potentially disrupting product catalogs and sales operations. The vulnerability has a CVSS 3.1 base score of 5.3 (medium severity), reflecting its network attack vector, no required privileges or user interaction, and limited impact confined to integrity without affecting confidentiality or availability. No patches or mitigations have been officially released by dugudlabs at the time of disclosure, and no known exploits have been reported in the wild. The vulnerability is particularly concerning for WordPress sites using WooCommerce and this plugin, as it could lead to significant business impact through loss of product data and customer trust. The lack of authorization checks is a critical security oversight that should be addressed promptly by plugin developers and site administrators.
Potential Impact
For European organizations, this vulnerability poses a risk primarily to e-commerce websites using WordPress with WooCommerce and the dugudlabs Eyewear prescription form plugin. The unauthorized deletion of product categories can lead to significant operational disruption, loss of sales, and damage to brand reputation. While it does not expose sensitive customer data or cause denial of service, the integrity compromise can result in downtime during recovery and potential financial losses. Retailers and service providers relying on accurate product categorization for customer navigation and inventory management are especially vulnerable. The ease of exploitation without authentication increases the risk of opportunistic attacks or automated scanning by malicious actors. This threat could also facilitate further attacks by creating confusion or gaps in product offerings, indirectly affecting customer trust and compliance with e-commerce regulations in Europe. Organizations may face challenges in quickly restoring deleted categories if backups are not current or comprehensive.
Mitigation Recommendations
Until an official patch is released by dugudlabs, European organizations should implement the following mitigations: 1) Immediately disable or restrict access to the RemoveItems AJAX action in the plugin code by adding proper capability checks or limiting it to authenticated administrators only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the 'catIds' parameter or the RemoveItems action. 3) Regularly back up WooCommerce product categories and related data to enable rapid restoration in case of unauthorized deletions. 4) Monitor web server and application logs for unusual AJAX activity or repeated requests to the vulnerable endpoint. 5) Consider temporarily disabling the dugudlabs Eyewear prescription form plugin if it is not critical to business operations. 6) Stay alert for vendor updates and apply patches promptly once available. 7) Conduct security audits of all WordPress plugins to identify and remediate similar missing authorization issues proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-09T18:23:53.612Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 693cef64d977419e584a5026
Added to database: 12/13/2025, 4:45:24 AM
Last enriched: 12/20/2025, 6:20:47 AM
Last updated: 2/7/2026, 10:23:05 AM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.