Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49352: CWE-639 Authorization Bypass Through User-Controlled Key in YoOhw Studio Order Cancellation & Returns for WooCommerce

0
Medium
VulnerabilityCVE-2025-49352cvecve-2025-49352cwe-639
Published: Wed Dec 31 2025 (12/31/2025, 16:25:44 UTC)
Source: CVE Database V5
Vendor/Project: YoOhw Studio
Product: Order Cancellation & Returns for WooCommerce

Description

Authorization Bypass Through User-Controlled Key vulnerability in YoOhw Studio Order Cancellation & Returns for WooCommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Order Cancellation & Returns for WooCommerce: from n/a through 1.1.10.

AI-Powered Analysis

AILast updated: 01/20/2026, 20:00:14 UTC

Technical Analysis

CVE-2025-49352 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the YoOhw Studio Order Cancellation & Returns plugin for WooCommerce. The vulnerability stems from incorrectly configured access control mechanisms that rely on user-supplied keys to authorize order cancellation or return requests. An attacker with low privileges (likely a logged-in user with some access to order management functions) can exploit this flaw to bypass intended authorization checks and manipulate orders without proper permissions. This could allow unauthorized cancellation or return of orders, undermining the integrity of the e-commerce transaction process. The vulnerability affects all versions up to 1.1.10, with no patches currently available. The CVSS v3.1 score of 4.3 reflects a medium severity, considering the network attack vector, low attack complexity, required privileges, and no user interaction needed. Although no known exploits have been reported in the wild, the vulnerability poses a risk to the integrity of order data and could facilitate fraudulent activities or disrupt business operations. The flaw is particularly relevant for WooCommerce installations using this plugin, which is popular among small to medium-sized online retailers. The issue was reserved in June 2025 and published at the end of 2025, indicating a recent discovery and disclosure.

Potential Impact

For European organizations, especially e-commerce businesses relying on WooCommerce with the affected plugin, this vulnerability could lead to unauthorized order cancellations or returns, causing financial losses and customer trust erosion. Attackers exploiting this flaw can manipulate order statuses without proper authorization, potentially enabling fraud, inventory discrepancies, and operational disruptions. The integrity of transaction records may be compromised, complicating dispute resolution and accounting. While availability and confidentiality are not directly impacted, the integrity breach can have cascading effects on business processes and customer satisfaction. Given the widespread use of WooCommerce in Europe, particularly in countries with mature e-commerce markets, the risk is significant for retailers who have not updated or mitigated this vulnerability. Regulatory compliance risks may also arise if order manipulation leads to inaccurate financial reporting or breaches of consumer protection laws.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they use the YoOhw Studio Order Cancellation & Returns plugin and identify the affected versions (up to 1.1.10). Until an official patch is released, restrict access to order cancellation and return functionalities to only trusted, high-privilege users. Implement strict role-based access controls within WooCommerce and the plugin settings. Monitor and audit order cancellation and return logs for unusual or unauthorized activities. Consider temporarily disabling the plugin if feasible or replacing it with alternative solutions that do not exhibit this vulnerability. Engage with the plugin vendor or community to obtain updates or patches as soon as they become available. Additionally, educate staff about the risks of unauthorized order modifications and enforce strong authentication mechanisms for administrative access. Employ web application firewalls (WAFs) to detect and block suspicious requests targeting order management endpoints. Regularly review and update security policies related to e-commerce operations.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:42:34.940Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695552dadb813ff03ef39008

Added to database: 12/31/2025, 4:44:10 PM

Last enriched: 1/20/2026, 8:00:14 PM

Last updated: 2/7/2026, 5:14:01 PM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats