Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-31854: Missing Authorization in Sharaz Shahid Simple Sticky Add To Cart For WooCommerce

0
Unknown
VulnerabilityCVE-2025-31854cvecve-2025-31854
Published: Tue Apr 01 2025 (04/01/2025, 14:52:02 UTC)
Source: CVE Database V5
Vendor/Project: Sharaz Shahid
Product: Simple Sticky Add To Cart For WooCommerce

Description

Missing Authorization vulnerability in Sharaz Shahid Simple Sticky Add To Cart For WooCommerce sticky-add-to-cart-woo allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Simple Sticky Add To Cart For WooCommerce: from n/a through <= 1.4.9.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/02/2026, 02:15:57 UTC

Technical Analysis

CVE-2025-31854 identifies a missing authorization vulnerability in the Simple Sticky Add To Cart For WooCommerce plugin developed by Sharaz Shahid. This plugin enhances WooCommerce by providing sticky add-to-cart functionality, improving user experience on e-commerce sites. The vulnerability exists because the plugin fails to enforce proper access control checks on certain operations, allowing unauthorized users to perform actions that should be restricted. Specifically, the plugin's security model incorrectly configures access control levels, leading to a scenario where attackers can exploit these gaps to manipulate cart-related functions without proper authorization. The affected versions include all releases up to and including version 1.4.9. While no public exploits have been observed, the flaw could be leveraged to alter shopping cart contents, potentially leading to fraudulent transactions, unauthorized purchases, or disruption of e-commerce workflows. The vulnerability impacts the confidentiality of user data, the integrity of transaction processes, and the availability of the shopping cart functionality. The lack of a CVSS score and official patches indicates that the issue is newly disclosed and requires immediate attention from site administrators. The vulnerability does not require user interaction but may require the attacker to access the WooCommerce environment, possibly through other compromised credentials or vulnerabilities. Given WooCommerce's widespread adoption globally, this vulnerability poses a significant risk to online retailers using the affected plugin.

Potential Impact

The missing authorization vulnerability in the Simple Sticky Add To Cart For WooCommerce plugin can have severe consequences for organizations running WooCommerce-based e-commerce platforms. Unauthorized manipulation of cart functions can lead to fraudulent transactions, financial losses, and erosion of customer trust. Attackers might add or remove items from carts, bypass pricing rules, or interfere with order processing, impacting revenue and operational integrity. The flaw could also be exploited to disrupt service availability, causing denial of service to legitimate customers. Confidential customer data, including purchase history and personal information, may be exposed or altered, raising compliance and privacy concerns. The absence of proper authorization checks increases the attack surface, making it easier for attackers to escalate privileges or pivot to other parts of the system. Organizations may face reputational damage and regulatory penalties if the vulnerability is exploited. The impact is magnified for large-scale e-commerce operations with high transaction volumes and sensitive customer data. Since no known exploits are currently active, proactive mitigation is critical to prevent future attacks.

Mitigation Recommendations

To mitigate CVE-2025-31854, organizations should immediately audit and review the access control configurations of the Simple Sticky Add To Cart For WooCommerce plugin. Restrict plugin functionalities to trusted users and roles, ensuring that only authorized personnel can perform cart-related operations. Monitor WooCommerce logs for unusual cart activity or unauthorized access attempts. Implement web application firewalls (WAF) with custom rules to detect and block suspicious requests targeting the plugin endpoints. Regularly update the plugin to the latest version once the vendor releases a patch addressing this vulnerability. In the interim, consider disabling or replacing the plugin if feasible to eliminate the attack vector. Conduct penetration testing focusing on authorization controls within the WooCommerce environment. Educate site administrators about the risks of missing authorization and the importance of principle of least privilege. Employ multi-factor authentication (MFA) for administrative access to reduce the risk of credential compromise. Maintain regular backups of e-commerce data to enable recovery in case of exploitation.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-04-01T13:21:00.365Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69cd7398e6bfc5ba1def2f08

Added to database: 4/1/2026, 7:35:52 PM

Last enriched: 4/2/2026, 2:15:57 AM

Last updated: 4/6/2026, 9:35:08 AM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses