CVE-2025-1780: CWE-862 Missing Authorization in svenl77 BuddyPress WooCommerce My Account Integration. Create WooCommerce Member Pages
CVE-2025-1780 is a medium severity vulnerability in the BuddyPress WooCommerce My Account Integration plugin for WordPress, affecting all versions up to 3. 4. 25. It arises from a missing authorization check in the wc4bp_delete_page() function, allowing authenticated users with Subscriber-level privileges or higher to modify plugin page settings without proper permissions. The vulnerability does not impact confidentiality or availability but allows integrity compromise by unauthorized modification of plugin settings. Exploitation requires no user interaction and can be performed remotely over the network. There are no known exploits in the wild currently. Organizations using this plugin should apply patches or implement strict access controls to mitigate risk. The vulnerability primarily affects WordPress sites using this plugin, which are common in countries with high WordPress adoption and WooCommerce usage. The CVSS score is 4.
AI Analysis
Technical Summary
CVE-2025-1780 is a vulnerability classified under CWE-862 (Missing Authorization) found in the BuddyPress WooCommerce My Account Integration plugin for WordPress, developed by svenl77. This plugin facilitates the creation of WooCommerce member pages integrated with BuddyPress. The vulnerability exists because the wc4bp_delete_page() function lacks a proper capability check, allowing authenticated users with Subscriber-level access or higher to update plugin page settings without appropriate authorization. This missing authorization check means that lower-privileged users can perform actions typically reserved for administrators or higher privileged roles. The vulnerability affects all versions up to and including 3.4.25. The CVSS 3.1 base score is 4.3, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, requiring privileges (low), no user interaction, and an impact limited to integrity (no confidentiality or availability impact). No patches or exploits are currently reported, but the vulnerability could allow unauthorized modification of plugin settings, potentially leading to further exploitation or site misconfiguration. The flaw is significant because it undermines the principle of least privilege and could be leveraged in multi-user WordPress environments where subscribers or similar roles exist.
Potential Impact
The primary impact of CVE-2025-1780 is unauthorized modification of plugin page settings by users with Subscriber-level access or higher. While it does not directly compromise confidentiality or availability, the integrity of the affected WordPress site’s WooCommerce member pages can be undermined. Attackers could alter page configurations, potentially disrupting user experience or enabling further attacks such as privilege escalation or social engineering. For organizations relying on WooCommerce and BuddyPress for membership management, this could lead to loss of trust, operational disruption, or indirect exposure to additional vulnerabilities. The vulnerability is particularly concerning in environments with many low-privilege users, such as community sites or e-commerce platforms with registered customers. Since exploitation requires only authenticated access at a low privilege level and no user interaction, the attack surface is significant in multi-user WordPress deployments. However, the lack of known exploits and the medium CVSS score suggest the threat is moderate but should not be ignored.
Mitigation Recommendations
To mitigate CVE-2025-1780, organizations should first check for and apply any official patches or updates from the plugin vendor once available. In the absence of a patch, administrators should restrict Subscriber-level user capabilities by using role management plugins to remove unnecessary privileges or limit access to the affected plugin’s functionality. Implementing strict access controls and monitoring changes to WooCommerce member pages can help detect unauthorized modifications. Additionally, consider temporarily disabling the affected plugin if it is not critical to operations. Regularly auditing user roles and permissions in WordPress environments is recommended to minimize risk exposure. Employing a Web Application Firewall (WAF) with custom rules to detect and block suspicious requests targeting the vulnerable function may provide interim protection. Finally, educating site administrators about this vulnerability and encouraging prompt response to updates will reduce the window of exposure.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, Netherlands, India, Brazil, Japan
CVE-2025-1780: CWE-862 Missing Authorization in svenl77 BuddyPress WooCommerce My Account Integration. Create WooCommerce Member Pages
Description
CVE-2025-1780 is a medium severity vulnerability in the BuddyPress WooCommerce My Account Integration plugin for WordPress, affecting all versions up to 3. 4. 25. It arises from a missing authorization check in the wc4bp_delete_page() function, allowing authenticated users with Subscriber-level privileges or higher to modify plugin page settings without proper permissions. The vulnerability does not impact confidentiality or availability but allows integrity compromise by unauthorized modification of plugin settings. Exploitation requires no user interaction and can be performed remotely over the network. There are no known exploits in the wild currently. Organizations using this plugin should apply patches or implement strict access controls to mitigate risk. The vulnerability primarily affects WordPress sites using this plugin, which are common in countries with high WordPress adoption and WooCommerce usage. The CVSS score is 4.
AI-Powered Analysis
Technical Analysis
CVE-2025-1780 is a vulnerability classified under CWE-862 (Missing Authorization) found in the BuddyPress WooCommerce My Account Integration plugin for WordPress, developed by svenl77. This plugin facilitates the creation of WooCommerce member pages integrated with BuddyPress. The vulnerability exists because the wc4bp_delete_page() function lacks a proper capability check, allowing authenticated users with Subscriber-level access or higher to update plugin page settings without appropriate authorization. This missing authorization check means that lower-privileged users can perform actions typically reserved for administrators or higher privileged roles. The vulnerability affects all versions up to and including 3.4.25. The CVSS 3.1 base score is 4.3, indicating a medium severity level, with an attack vector of network (remote), low attack complexity, requiring privileges (low), no user interaction, and an impact limited to integrity (no confidentiality or availability impact). No patches or exploits are currently reported, but the vulnerability could allow unauthorized modification of plugin settings, potentially leading to further exploitation or site misconfiguration. The flaw is significant because it undermines the principle of least privilege and could be leveraged in multi-user WordPress environments where subscribers or similar roles exist.
Potential Impact
The primary impact of CVE-2025-1780 is unauthorized modification of plugin page settings by users with Subscriber-level access or higher. While it does not directly compromise confidentiality or availability, the integrity of the affected WordPress site’s WooCommerce member pages can be undermined. Attackers could alter page configurations, potentially disrupting user experience or enabling further attacks such as privilege escalation or social engineering. For organizations relying on WooCommerce and BuddyPress for membership management, this could lead to loss of trust, operational disruption, or indirect exposure to additional vulnerabilities. The vulnerability is particularly concerning in environments with many low-privilege users, such as community sites or e-commerce platforms with registered customers. Since exploitation requires only authenticated access at a low privilege level and no user interaction, the attack surface is significant in multi-user WordPress deployments. However, the lack of known exploits and the medium CVSS score suggest the threat is moderate but should not be ignored.
Mitigation Recommendations
To mitigate CVE-2025-1780, organizations should first check for and apply any official patches or updates from the plugin vendor once available. In the absence of a patch, administrators should restrict Subscriber-level user capabilities by using role management plugins to remove unnecessary privileges or limit access to the affected plugin’s functionality. Implementing strict access controls and monitoring changes to WooCommerce member pages can help detect unauthorized modifications. Additionally, consider temporarily disabling the affected plugin if it is not critical to operations. Regularly auditing user roles and permissions in WordPress environments is recommended to minimize risk exposure. Employing a Web Application Firewall (WAF) with custom rules to detect and block suspicious requests targeting the vulnerable function may provide interim protection. Finally, educating site administrators about this vulnerability and encouraging prompt response to updates will reduce the window of exposure.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-02-28T15:20:33.379Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6b19b7ef31ef0b54e17d
Added to database: 2/25/2026, 9:35:21 PM
Last enriched: 2/25/2026, 10:10:10 PM
Last updated: 2/26/2026, 8:40:08 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-1698: CWE-644 Improper Neutralization of HTTP Headers for Scripting Syntax in arcinfo PcVue
MediumCVE-2026-1697: CWE-614 Sensitive Cookie in HTTPS Session Without 'Secure' Attribute in arcinfo PcVue
MediumCVE-2026-1696: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
LowCVE-2026-1695: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in arcinfo PcVue
MediumCVE-2026-1694: CWE-201 Insertion of Sensitive Information into Sent Data in arcinfo PcVue
LowActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.