Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14365: CWE-862 Missing Authorization in dugudlabs Eyewear prescription form

0
Medium
VulnerabilityCVE-2025-14365cvecve-2025-14365cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 04:31:31 UTC)
Source: CVE Database V5
Vendor/Project: dugudlabs
Product: Eyewear prescription form

Description

The Eyewear prescription form plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.0.1. This is due to missing capability checks on the RemoveItems AJAX action. This makes it possible for unauthenticated attackers to delete arbitrary WooCommerce product categories, including all of their child categories, via the 'catIds' parameter.

AI-Powered Analysis

AILast updated: 12/13/2025, 05:04:24 UTC

Technical Analysis

CVE-2025-14365 is a vulnerability classified under CWE-862 (Missing Authorization) found in the dugudlabs Eyewear prescription form plugin for WordPress, affecting all versions up to and including 6.0.1. The root cause is the absence of proper capability checks on the RemoveItems AJAX action endpoint. This flaw allows unauthenticated attackers to invoke this AJAX action and supply arbitrary 'catIds' parameters, which correspond to WooCommerce product category IDs. Consequently, attackers can delete any product category, including all nested child categories, without any authentication or user interaction. This unauthorized deletion compromises the integrity of the e-commerce product catalog, potentially disrupting business operations and causing loss of product data organization. The vulnerability does not affect confidentiality or availability directly, as it does not expose sensitive data or cause denial of service. The CVSS 3.1 base score is 5.3, indicating medium severity, with attack vector Network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to integrity (I:L). No patches or official fixes have been published at the time of disclosure, and no active exploitation has been reported. The vulnerability is particularly relevant for WordPress sites using both the dugudlabs Eyewear prescription form plugin and WooCommerce, a common e-commerce platform. Attackers could leverage this flaw to disrupt product listings, confuse customers, and potentially cause financial losses by deleting product categories critical to sales and inventory management.

Potential Impact

For European organizations, especially those operating e-commerce websites using WordPress with the dugudlabs Eyewear prescription form plugin and WooCommerce, this vulnerability poses a significant risk to data integrity. Unauthorized deletion of product categories can lead to operational disruptions, loss of sales, and damage to brand reputation. While it does not expose sensitive customer data or cause service outages, the ability to manipulate product categories without authentication can undermine trust and complicate inventory management. This is particularly impactful for medium to large online retailers who rely heavily on structured product categorization for customer navigation and sales analytics. Additionally, recovery from such unauthorized deletions may require manual restoration from backups, increasing downtime and operational costs. The absence of known exploits in the wild reduces immediate risk, but the ease of exploitation and lack of authentication requirements make it a viable target for opportunistic attackers. European organizations must consider the potential for targeted attacks aimed at disrupting e-commerce operations, especially during peak sales periods.

Mitigation Recommendations

To mitigate CVE-2025-14365, organizations should implement the following specific measures: 1) Immediately audit and restrict access to the RemoveItems AJAX action by enforcing strict capability checks to ensure only authorized users can perform category deletions. 2) If possible, disable or remove the dugudlabs Eyewear prescription form plugin until a patch is available, especially on sites where it is not critical. 3) Monitor WooCommerce product category deletions and related logs for unusual or unauthorized activity, setting up alerts for unexpected removals. 4) Employ web application firewalls (WAFs) with custom rules to block unauthenticated requests targeting the vulnerable AJAX endpoint. 5) Regularly back up WooCommerce product data and test restoration procedures to minimize downtime in case of data loss. 6) Stay informed about vendor updates and apply patches promptly once released. 7) Consider implementing additional authentication or multi-factor verification for administrative AJAX actions to reduce risk. 8) Review and tighten WordPress user roles and permissions to limit exposure. These targeted actions go beyond generic advice by focusing on the specific vulnerable component and attack vector.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T18:23:53.612Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef64d977419e584a5026

Added to database: 12/13/2025, 4:45:24 AM

Last enriched: 12/13/2025, 5:04:24 AM

Last updated: 12/15/2025, 1:39:17 AM

Views: 23

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats