CVE-2025-22667: Missing Authorization in Creative Werk Designs Export Order, Product, Customer & Coupon for WooCommerce to Google Sheets
Missing Authorization vulnerability in Creative Werk Designs Export Order, Product, Customer & Coupon for WooCommerce to Google Sheets wpsyncsheets-woocommerce.This issue affects Export Order, Product, Customer & Coupon for WooCommerce to Google Sheets: from n/a through <= 1.8.2.
AI Analysis
Technical Summary
CVE-2025-22667 identifies a Missing Authorization vulnerability in the Creative Werk Designs WordPress plugin 'Export Order, Product, Customer & Coupon for WooCommerce to Google Sheets' (wpsyncsheets-woocommerce), affecting all versions up to and including 1.8.2. The vulnerability stems from the plugin's failure to enforce proper authorization checks on its export functionalities, which allow exporting sensitive WooCommerce data such as orders, products, customer information, and coupons directly to Google Sheets. This lack of access control means that unauthenticated or unauthorized users could potentially trigger export operations, leading to unauthorized data disclosure. The plugin is designed to facilitate data synchronization between WooCommerce and Google Sheets, a common requirement for e-commerce analytics and reporting. However, the missing authorization check creates a critical security gap. Although no public exploits have been reported yet, the exposure of personally identifiable information (PII), order details, and coupon data could lead to privacy violations, financial fraud, or competitive intelligence gathering. The vulnerability was reserved in early January 2025 and published in late March 2025, but no official patches or updates have been linked yet. The absence of a CVSS score necessitates a severity assessment based on the nature of the vulnerability and its potential impact.
Potential Impact
The primary impact of this vulnerability is unauthorized data exposure, which can compromise customer privacy and business confidentiality. Attackers exploiting this flaw could extract sensitive e-commerce data including customer identities, purchase histories, product inventories, and discount coupons. This could facilitate identity theft, targeted phishing attacks, financial fraud, or unauthorized use of coupons leading to revenue loss. Additionally, the breach of customer trust and potential regulatory penalties related to data protection laws (such as GDPR or CCPA) could cause reputational damage and legal consequences. Since WooCommerce is widely used globally, organizations relying on this plugin for data export are at risk of significant operational disruption and data leakage. The ease of exploitation is relatively high given the missing authorization, and no authentication or user interaction is required, increasing the threat surface. The scope is limited to sites using this specific plugin, but given WooCommerce's popularity, the affected population is substantial.
Mitigation Recommendations
Until an official patch is released, organizations should take immediate steps to mitigate risk. First, restrict access to the plugin’s export functionality by limiting administrative or editor roles to trusted personnel only. Implement web application firewall (WAF) rules to detect and block suspicious export requests targeting the plugin endpoints. Monitor logs for unusual export activity or access patterns. Consider temporarily disabling the plugin if export functionality is not critical or replacing it with alternative solutions that enforce strict authorization. Keep WordPress, WooCommerce, and all plugins updated regularly and subscribe to vendor security advisories for prompt patch deployment. Conduct a thorough audit of exported data and access permissions to ensure no unauthorized data has been leaked. Finally, educate staff on the risks of unauthorized data access and enforce strong access control policies within the CMS environment.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, India, France, Netherlands, Brazil, Japan
CVE-2025-22667: Missing Authorization in Creative Werk Designs Export Order, Product, Customer & Coupon for WooCommerce to Google Sheets
Description
Missing Authorization vulnerability in Creative Werk Designs Export Order, Product, Customer & Coupon for WooCommerce to Google Sheets wpsyncsheets-woocommerce.This issue affects Export Order, Product, Customer & Coupon for WooCommerce to Google Sheets: from n/a through <= 1.8.2.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-22667 identifies a Missing Authorization vulnerability in the Creative Werk Designs WordPress plugin 'Export Order, Product, Customer & Coupon for WooCommerce to Google Sheets' (wpsyncsheets-woocommerce), affecting all versions up to and including 1.8.2. The vulnerability stems from the plugin's failure to enforce proper authorization checks on its export functionalities, which allow exporting sensitive WooCommerce data such as orders, products, customer information, and coupons directly to Google Sheets. This lack of access control means that unauthenticated or unauthorized users could potentially trigger export operations, leading to unauthorized data disclosure. The plugin is designed to facilitate data synchronization between WooCommerce and Google Sheets, a common requirement for e-commerce analytics and reporting. However, the missing authorization check creates a critical security gap. Although no public exploits have been reported yet, the exposure of personally identifiable information (PII), order details, and coupon data could lead to privacy violations, financial fraud, or competitive intelligence gathering. The vulnerability was reserved in early January 2025 and published in late March 2025, but no official patches or updates have been linked yet. The absence of a CVSS score necessitates a severity assessment based on the nature of the vulnerability and its potential impact.
Potential Impact
The primary impact of this vulnerability is unauthorized data exposure, which can compromise customer privacy and business confidentiality. Attackers exploiting this flaw could extract sensitive e-commerce data including customer identities, purchase histories, product inventories, and discount coupons. This could facilitate identity theft, targeted phishing attacks, financial fraud, or unauthorized use of coupons leading to revenue loss. Additionally, the breach of customer trust and potential regulatory penalties related to data protection laws (such as GDPR or CCPA) could cause reputational damage and legal consequences. Since WooCommerce is widely used globally, organizations relying on this plugin for data export are at risk of significant operational disruption and data leakage. The ease of exploitation is relatively high given the missing authorization, and no authentication or user interaction is required, increasing the threat surface. The scope is limited to sites using this specific plugin, but given WooCommerce's popularity, the affected population is substantial.
Mitigation Recommendations
Until an official patch is released, organizations should take immediate steps to mitigate risk. First, restrict access to the plugin’s export functionality by limiting administrative or editor roles to trusted personnel only. Implement web application firewall (WAF) rules to detect and block suspicious export requests targeting the plugin endpoints. Monitor logs for unusual export activity or access patterns. Consider temporarily disabling the plugin if export functionality is not critical or replacing it with alternative solutions that enforce strict authorization. Keep WordPress, WooCommerce, and all plugins updated regularly and subscribe to vendor security advisories for prompt patch deployment. Conduct a thorough audit of exported data and access permissions to ensure no unauthorized data has been leaked. Finally, educate staff on the risks of unauthorized data access and enforce strong access control policies within the CMS environment.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-01-07T21:02:51.801Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69cd75ffe6bfc5ba1df08d32
Added to database: 4/1/2026, 7:46:07 PM
Last enriched: 4/2/2026, 12:40:29 AM
Last updated: 4/6/2026, 9:04:09 AM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.