CVE-2025-4101: CWE-863 Incorrect Authorization in wcmp MultiVendorX – WooCommerce Multivendor Marketplace Solutions
The MultiVendorX – WooCommerce Multivendor Marketplace Solutions plugin for WordPress is vulnerable to unauthorized loss of data due to a misconfigured capability check on the 'delete_fpm_product' function in all versions up to, and including, 4.2.22. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary posts, pages, attachments, and products. The vulnerability was partially patched in version 4.2.22.
AI Analysis
Technical Summary
CVE-2025-4101 is a medium-severity vulnerability affecting the MultiVendorX – WooCommerce Multivendor Marketplace Solutions plugin for WordPress, a widely used e-commerce extension that enables multivendor marketplace functionality. The vulnerability stems from an incorrect authorization check (CWE-863) in the 'delete_fpm_product' function. Specifically, the plugin fails to properly verify user capabilities before allowing deletion of products and other content types. Authenticated users with Contributor-level access or higher can exploit this flaw to delete arbitrary posts, pages, attachments, and products. This can lead to unauthorized data loss and disruption of marketplace operations. The vulnerability affects all versions up to and including 4.2.22, with only a partial patch applied in version 4.2.22, indicating that some risk remains if the patch is not fully effective or not applied. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires low privileges (authenticated Contributor), no user interaction, and impacts integrity but not confidentiality or availability. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and could be targeted by attackers seeking to disrupt e-commerce platforms or cause data loss. Given the plugin’s role in managing product data and marketplace content, exploitation could result in significant operational impact for affected websites.
Potential Impact
For European organizations operating WooCommerce-based multivendor marketplaces using the vulnerable MultiVendorX plugin, this vulnerability poses a risk of unauthorized deletion of critical content including products and pages. This can disrupt business operations, cause loss of sales, damage reputation, and require costly recovery efforts. Since Contributor-level access is sufficient to exploit the flaw, insider threats or compromised lower-privilege accounts could be leveraged by attackers. The impact is particularly relevant for SMEs and larger e-commerce platforms relying on WordPress and WooCommerce for their online sales channels. Data loss could also affect compliance with data integrity requirements under regulations like GDPR, especially if product information or customer-facing content is altered or removed. Although the vulnerability does not directly expose sensitive data or cause availability outages, the integrity loss and operational disruption can have cascading effects on customer trust and revenue streams.
Mitigation Recommendations
1. Immediate application of the latest MultiVendorX plugin updates is critical, ensuring that version 4.2.22 or later is installed and verified to include a complete fix for the authorization flaw. 2. Restrict Contributor-level and higher privileges strictly to trusted users, and review user roles and permissions regularly to minimize the attack surface. 3. Implement additional monitoring and alerting on deletion events within WordPress, especially for product and page deletions, to detect suspicious activity promptly. 4. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized deletion attempts targeting the vulnerable function. 5. Conduct regular backups of WordPress content and database to enable rapid restoration in case of data loss. 6. Consider deploying multi-factor authentication (MFA) for all users with Contributor or higher roles to reduce risk of account compromise. 7. Engage in security audits and penetration testing focused on WordPress plugins and user privilege escalation to identify and remediate similar issues proactively.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-4101: CWE-863 Incorrect Authorization in wcmp MultiVendorX – WooCommerce Multivendor Marketplace Solutions
Description
The MultiVendorX – WooCommerce Multivendor Marketplace Solutions plugin for WordPress is vulnerable to unauthorized loss of data due to a misconfigured capability check on the 'delete_fpm_product' function in all versions up to, and including, 4.2.22. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary posts, pages, attachments, and products. The vulnerability was partially patched in version 4.2.22.
AI-Powered Analysis
Technical Analysis
CVE-2025-4101 is a medium-severity vulnerability affecting the MultiVendorX – WooCommerce Multivendor Marketplace Solutions plugin for WordPress, a widely used e-commerce extension that enables multivendor marketplace functionality. The vulnerability stems from an incorrect authorization check (CWE-863) in the 'delete_fpm_product' function. Specifically, the plugin fails to properly verify user capabilities before allowing deletion of products and other content types. Authenticated users with Contributor-level access or higher can exploit this flaw to delete arbitrary posts, pages, attachments, and products. This can lead to unauthorized data loss and disruption of marketplace operations. The vulnerability affects all versions up to and including 4.2.22, with only a partial patch applied in version 4.2.22, indicating that some risk remains if the patch is not fully effective or not applied. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based, requires low privileges (authenticated Contributor), no user interaction, and impacts integrity but not confidentiality or availability. No known exploits are currently reported in the wild, but the vulnerability is publicly disclosed and could be targeted by attackers seeking to disrupt e-commerce platforms or cause data loss. Given the plugin’s role in managing product data and marketplace content, exploitation could result in significant operational impact for affected websites.
Potential Impact
For European organizations operating WooCommerce-based multivendor marketplaces using the vulnerable MultiVendorX plugin, this vulnerability poses a risk of unauthorized deletion of critical content including products and pages. This can disrupt business operations, cause loss of sales, damage reputation, and require costly recovery efforts. Since Contributor-level access is sufficient to exploit the flaw, insider threats or compromised lower-privilege accounts could be leveraged by attackers. The impact is particularly relevant for SMEs and larger e-commerce platforms relying on WordPress and WooCommerce for their online sales channels. Data loss could also affect compliance with data integrity requirements under regulations like GDPR, especially if product information or customer-facing content is altered or removed. Although the vulnerability does not directly expose sensitive data or cause availability outages, the integrity loss and operational disruption can have cascading effects on customer trust and revenue streams.
Mitigation Recommendations
1. Immediate application of the latest MultiVendorX plugin updates is critical, ensuring that version 4.2.22 or later is installed and verified to include a complete fix for the authorization flaw. 2. Restrict Contributor-level and higher privileges strictly to trusted users, and review user roles and permissions regularly to minimize the attack surface. 3. Implement additional monitoring and alerting on deletion events within WordPress, especially for product and page deletions, to detect suspicious activity promptly. 4. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized deletion attempts targeting the vulnerable function. 5. Conduct regular backups of WordPress content and database to enable rapid restoration in case of data loss. 6. Consider deploying multi-factor authentication (MFA) for all users with Contributor or higher roles to reduce risk of account compromise. 7. Engage in security audits and penetration testing focused on WordPress plugins and user privilege escalation to identify and remediate similar issues proactively.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-04-29T18:54:24.866Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682cd0f81484d88663aeb722
Added to database: 5/20/2025, 6:59:04 PM
Last enriched: 7/11/2025, 7:33:32 PM
Last updated: 1/7/2026, 6:12:45 AM
Views: 42
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-14835: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in opajaap WP Photo Album Plus
HighCVE-2026-0650: CWE-306 Missing Authentication for Critical Function in OpenFlagr Flagr
CriticalCVE-2025-15474: CWE-770 Allocation of Resources Without Limits or Throttling in AuntyFey AuntyFey Smart Combination Lock
MediumCVE-2025-14468: CWE-352 Cross-Site Request Forgery (CSRF) in mohammed_kaludi AMP for WP – Accelerated Mobile Pages
MediumCVE-2025-9611: CWE-749 Exposed Dangerous Method or Function in Microsoft Playwright
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.