Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-26765: Missing Authorization in enituretechnology Distance Based Shipping Calculator

0
Unknown
VulnerabilityCVE-2025-26765cvecve-2025-26765
Published: Sun Feb 16 2025 (02/16/2025, 22:17:18 UTC)
Source: CVE Database V5
Vendor/Project: enituretechnology
Product: Distance Based Shipping Calculator

Description

Missing Authorization vulnerability in enituretechnology Distance Based Shipping Calculator distance-based-shipping-calculator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Distance Based Shipping Calculator: from n/a through <= 2.0.22.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/01/2026, 22:28:52 UTC

Technical Analysis

CVE-2025-26765 identifies a Missing Authorization vulnerability in the enituretechnology Distance Based Shipping Calculator plugin, which is used to calculate shipping costs based on distance in e-commerce platforms. The vulnerability stems from incorrectly configured access control security levels that fail to properly restrict unauthorized users from accessing or manipulating the plugin's functionality. Affected versions include all versions up to and including 2.0.22. This flaw allows attackers without proper authentication or authorization to potentially exploit the plugin, leading to unauthorized access or modification of shipping calculations. Such unauthorized access could result in manipulation of shipping costs, potentially causing financial loss or disruption to business operations. Although no public exploits have been reported yet, the nature of the vulnerability suggests it could be exploited by attackers with network access to the affected system. The vulnerability does not require user interaction but does not specify if authentication is required, implying that missing authorization could allow unauthenticated or low-privilege users to exploit it. The lack of a CVSS score indicates the need for an expert severity assessment, which here is considered high due to the direct impact on business-critical functions and ease of exploitation. The vulnerability was published on February 16, 2025, and currently no patches or fixes are linked, highlighting the need for vendor response and user vigilance.

Potential Impact

The primary impact of CVE-2025-26765 is the potential unauthorized access and manipulation of shipping cost calculations within e-commerce platforms using the affected plugin. This can lead to financial losses either through undercharging or overcharging customers, damaging customer trust and brand reputation. Additionally, attackers could exploit this vulnerability to disrupt normal business operations, causing logistical challenges and potential revenue loss. The integrity of shipping data is compromised, which may also affect inventory management and order fulfillment processes. Organizations relying heavily on automated shipping calculations are particularly vulnerable, as the flaw could be leveraged to bypass intended business rules. While availability impact is limited, the confidentiality of shipping-related data might be exposed if unauthorized access extends to sensitive customer or order information. The scope includes all installations of the affected plugin versions, which may be widespread in certain e-commerce markets. The absence of known exploits suggests the threat is currently theoretical but could become active if attackers develop exploit code.

Mitigation Recommendations

Organizations should immediately audit their use of the enituretechnology Distance Based Shipping Calculator plugin and verify the version in use. Until an official patch is released, restrict access to the plugin’s administrative and configuration interfaces to trusted, authenticated users only, using network segmentation and role-based access controls. Monitor logs for unusual access patterns or unauthorized attempts to interact with the shipping calculator. Engage with the vendor to obtain timely patches or updates addressing the missing authorization issue. Consider implementing web application firewalls (WAFs) with custom rules to block unauthorized requests targeting the plugin endpoints. Educate staff about the risks of unauthorized access and enforce strong authentication mechanisms for e-commerce platform administration. Regularly review and test access control configurations to ensure they meet the principle of least privilege. Finally, prepare incident response plans to quickly address any exploitation attempts once patches are available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-02-14T06:53:32.111Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd72afe6bfc5ba1deec9bb

Added to database: 4/1/2026, 7:31:59 PM

Last enriched: 4/1/2026, 10:28:52 PM

Last updated: 4/6/2026, 9:22:31 AM

Views: 2

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses