CVE-2025-47634: CWE-862 Missing Authorization in Keylor Mendoza WC Pickup Store
Missing Authorization vulnerability in Keylor Mendoza WC Pickup Store allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WC Pickup Store: from n/a through 1.8.9.
AI Analysis
Technical Summary
CVE-2025-47634 is a security vulnerability classified under CWE-862, which refers to Missing Authorization. This vulnerability affects the WC Pickup Store plugin developed by Keylor Mendoza, specifically versions up to 1.8.9. The issue arises due to incorrectly configured access control security levels, allowing unauthorized users to perform actions or access resources that should be restricted. The vulnerability does not require any authentication or user interaction to be exploited, and it can be triggered remotely over the network (AV:N/AC:L/PR:N/UI:N). The impact primarily affects the integrity and availability of the affected system, as unauthorized actions could modify or disrupt the normal functioning of the WC Pickup Store plugin. The CVSS v3.1 base score is 6.5, indicating a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's presence in an e-commerce-related WordPress plugin (WC Pickup Store) suggests that attackers could manipulate order pickup processes, potentially leading to fraudulent orders, denial of service, or data tampering within the plugin's scope.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WordPress with the WC Pickup Store plugin, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized modification of order pickup details, disruption of order fulfillment, or denial of service affecting customer experience and business operations. This could result in financial losses, reputational damage, and potential regulatory scrutiny under GDPR if customer data integrity or availability is compromised. The medium severity score reflects that while confidentiality is not directly impacted, integrity and availability concerns are significant. Organizations relying on this plugin for order management should be aware that attackers do not need credentials or user interaction, increasing the risk of automated exploitation attempts.
Mitigation Recommendations
Given the absence of an official patch at this time, European organizations should implement compensating controls immediately. These include restricting network access to the WordPress admin and plugin endpoints via IP whitelisting or VPN, employing web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin, and monitoring logs for unusual activity related to order pickup operations. Administrators should audit user permissions to ensure minimal privilege principles are enforced and disable or remove the WC Pickup Store plugin if it is not essential. Additionally, organizations should subscribe to vendor and security advisories for prompt updates and apply patches as soon as they become available. Regular backups and incident response plans should be reviewed to prepare for potential exploitation scenarios.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland
CVE-2025-47634: CWE-862 Missing Authorization in Keylor Mendoza WC Pickup Store
Description
Missing Authorization vulnerability in Keylor Mendoza WC Pickup Store allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects WC Pickup Store: from n/a through 1.8.9.
AI-Powered Analysis
Technical Analysis
CVE-2025-47634 is a security vulnerability classified under CWE-862, which refers to Missing Authorization. This vulnerability affects the WC Pickup Store plugin developed by Keylor Mendoza, specifically versions up to 1.8.9. The issue arises due to incorrectly configured access control security levels, allowing unauthorized users to perform actions or access resources that should be restricted. The vulnerability does not require any authentication or user interaction to be exploited, and it can be triggered remotely over the network (AV:N/AC:L/PR:N/UI:N). The impact primarily affects the integrity and availability of the affected system, as unauthorized actions could modify or disrupt the normal functioning of the WC Pickup Store plugin. The CVSS v3.1 base score is 6.5, indicating a medium severity level. No known exploits are currently reported in the wild, and no patches have been linked yet. The vulnerability's presence in an e-commerce-related WordPress plugin (WC Pickup Store) suggests that attackers could manipulate order pickup processes, potentially leading to fraudulent orders, denial of service, or data tampering within the plugin's scope.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WordPress with the WC Pickup Store plugin, this vulnerability poses a tangible risk. Exploitation could lead to unauthorized modification of order pickup details, disruption of order fulfillment, or denial of service affecting customer experience and business operations. This could result in financial losses, reputational damage, and potential regulatory scrutiny under GDPR if customer data integrity or availability is compromised. The medium severity score reflects that while confidentiality is not directly impacted, integrity and availability concerns are significant. Organizations relying on this plugin for order management should be aware that attackers do not need credentials or user interaction, increasing the risk of automated exploitation attempts.
Mitigation Recommendations
Given the absence of an official patch at this time, European organizations should implement compensating controls immediately. These include restricting network access to the WordPress admin and plugin endpoints via IP whitelisting or VPN, employing web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin, and monitoring logs for unusual activity related to order pickup operations. Administrators should audit user permissions to ensure minimal privilege principles are enforced and disable or remove the WC Pickup Store plugin if it is not essential. Additionally, organizations should subscribe to vendor and security advisories for prompt updates and apply patches as soon as they become available. Regular backups and incident response plans should be reviewed to prepare for potential exploitation scenarios.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-05-07T10:44:48.426Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6867b9f06f40f0eb72a049aa
Added to database: 7/4/2025, 11:24:32 AM
Last enriched: 7/4/2025, 11:57:09 AM
Last updated: 10/30/2025, 5:11:09 AM
Views: 35
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-24893: CWE-95: Improper Neutralization of Directives in Dynamically Evaluated Code ('Eval Injection') in xwiki xwiki-platform
CriticalCVE-2024-2961: CWE-787 Out-of-bounds Write in The GNU C Library glibc
HighCVE-2025-12475: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in creativethemeshq Blocksy Companion
MediumCVE-2025-62257: CWE-307 Improper Restriction of Excessive Authentication Attempts in Liferay Portal
MediumCVE-2025-9954: CWE-862 Missing Authorization in Drupal Acquia DAM
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.