Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14365: CWE-862 Missing Authorization in dugudlabs Eyewear prescription form

0
Medium
VulnerabilityCVE-2025-14365cvecve-2025-14365cwe-862
Published: Sat Dec 13 2025 (12/13/2025, 04:31:31 UTC)
Source: CVE Database V5
Vendor/Project: dugudlabs
Product: Eyewear prescription form

Description

The Eyewear prescription form plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 6.0.1. This is due to missing capability checks on the RemoveItems AJAX action. This makes it possible for unauthenticated attackers to delete arbitrary WooCommerce product categories, including all of their child categories, via the 'catIds' parameter.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:07:55 UTC

Technical Analysis

CVE-2025-14365 is a vulnerability classified under CWE-862 (Missing Authorization) found in the dugudlabs Eyewear prescription form plugin for WordPress. This plugin, widely used to facilitate eyewear prescription submissions, integrates with WooCommerce for product management. The vulnerability exists because the RemoveItems AJAX action lacks proper capability checks, allowing unauthenticated attackers to invoke this action remotely. By manipulating the 'catIds' parameter, attackers can delete arbitrary WooCommerce product categories, including all nested child categories. This deletion compromises the integrity of the e-commerce product catalog, potentially disrupting business operations and causing loss of product data organization. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based (AV:N), requires no privileges (PR:N), and no user interaction (UI:N), but impacts integrity only (I:L) without affecting confidentiality or availability. No patches or exploits are currently known, but the vulnerability's presence in all versions up to 6.0.1 means that many installations remain exposed. The lack of authorization checks is a critical oversight in the plugin's design, emphasizing the need for secure coding practices in WordPress plugin development, especially when handling AJAX actions that modify data.

Potential Impact

The primary impact of this vulnerability is on the integrity of WooCommerce product categories within affected WordPress sites. Unauthorized deletion of product categories can lead to significant disruption in e-commerce operations, including loss of product organization, potential revenue loss, and increased administrative overhead to restore deleted categories. While confidentiality and availability are not directly affected, the integrity compromise can indirectly affect availability if critical product categories are removed, causing confusion or inability to sell certain products. For organizations relying heavily on WooCommerce for online sales, this can degrade customer experience and damage brand reputation. Since exploitation requires no authentication and can be performed remotely, the attack surface is broad, increasing the risk of automated or opportunistic attacks. The absence of known exploits in the wild suggests limited current exploitation but does not preclude future attacks, especially if the vulnerability becomes publicly known.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit their WordPress installations for the dugudlabs Eyewear prescription form plugin and upgrade to a patched version once available. In the absence of an official patch, administrators should implement manual capability checks on the RemoveItems AJAX action to ensure only authorized users can perform category deletions. This can be done by modifying the plugin code to verify user permissions against WooCommerce product category management capabilities before processing the request. Additionally, monitoring logs for unusual AJAX requests targeting RemoveItems and unexpected deletions of product categories can help detect exploitation attempts. Employing a Web Application Firewall (WAF) with custom rules to block unauthorized AJAX requests to this endpoint can provide a temporary protective layer. Regular backups of WooCommerce product data and categories are critical to enable rapid restoration in case of successful exploitation. Finally, educating site administrators about the risks of installing unverified plugins and encouraging the use of security best practices in plugin development can reduce future vulnerabilities.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-09T18:23:53.612Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 693cef64d977419e584a5026

Added to database: 12/13/2025, 4:45:24 AM

Last enriched: 2/27/2026, 11:07:55 AM

Last updated: 3/24/2026, 12:17:13 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses