Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14365: CWE-862 Missing Authorization in dugudlabs Eyewear prescription form

0
Medium
VulnerabilityCVE-2025-14365cvecve-2025-14365cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 04:31:31 UTC)
Source: CVE Database V5
Vendor/Project: dugudlabs
Product: Eyewear prescription form

Description

The Eyewear prescription form plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.0.1. This is due to missing capability checks on the RemoveItems AJAX action. This makes it possible for unauthenticated attackers to delete arbitrary WooCommerce product categories, including all of their child categories, via the 'catIds' parameter.

AI-Powered Analysis

AILast updated: 12/20/2025, 06:20:47 UTC

Technical Analysis

CVE-2025-14365 identifies a missing authorization vulnerability (CWE-862) in the dugudlabs Eyewear prescription form plugin for WordPress, present in all versions up to and including 6.0.1. The vulnerability arises because the RemoveItems AJAX action lacks proper capability checks, allowing unauthenticated users to invoke this action remotely. By exploiting this flaw, an attacker can supply arbitrary category IDs via the 'catIds' parameter to delete WooCommerce product categories and all their child categories. This unauthorized deletion compromises the integrity of the e-commerce data, potentially disrupting product catalogs and sales operations. The vulnerability has a CVSS 3.1 base score of 5.3 (medium severity), reflecting its network attack vector, no required privileges or user interaction, and limited impact confined to integrity without affecting confidentiality or availability. No patches or mitigations have been officially released by dugudlabs at the time of disclosure, and no known exploits have been reported in the wild. The vulnerability is particularly concerning for WordPress sites using WooCommerce and this plugin, as it could lead to significant business impact through loss of product data and customer trust. The lack of authorization checks is a critical security oversight that should be addressed promptly by plugin developers and site administrators.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to e-commerce websites using WordPress with WooCommerce and the dugudlabs Eyewear prescription form plugin. The unauthorized deletion of product categories can lead to significant operational disruption, loss of sales, and damage to brand reputation. While it does not expose sensitive customer data or cause denial of service, the integrity compromise can result in downtime during recovery and potential financial losses. Retailers and service providers relying on accurate product categorization for customer navigation and inventory management are especially vulnerable. The ease of exploitation without authentication increases the risk of opportunistic attacks or automated scanning by malicious actors. This threat could also facilitate further attacks by creating confusion or gaps in product offerings, indirectly affecting customer trust and compliance with e-commerce regulations in Europe. Organizations may face challenges in quickly restoring deleted categories if backups are not current or comprehensive.

Mitigation Recommendations

Until an official patch is released by dugudlabs, European organizations should implement the following mitigations: 1) Immediately disable or restrict access to the RemoveItems AJAX action in the plugin code by adding proper capability checks or limiting it to authenticated administrators only. 2) Employ Web Application Firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the 'catIds' parameter or the RemoveItems action. 3) Regularly back up WooCommerce product categories and related data to enable rapid restoration in case of unauthorized deletions. 4) Monitor web server and application logs for unusual AJAX activity or repeated requests to the vulnerable endpoint. 5) Consider temporarily disabling the dugudlabs Eyewear prescription form plugin if it is not critical to business operations. 6) Stay alert for vendor updates and apply patches promptly once available. 7) Conduct security audits of all WordPress plugins to identify and remediate similar missing authorization issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T18:23:53.612Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef64d977419e584a5026

Added to database: 12/13/2025, 4:45:24 AM

Last enriched: 12/20/2025, 6:20:47 AM

Last updated: 2/7/2026, 10:23:05 AM

Views: 49

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats