Skip to main content

CVE-2025-5816: CWE-862 Missing Authorization in biteship Plugin Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship

Medium
VulnerabilityCVE-2025-5816cvecve-2025-5816cwe-862
Published: Fri Jul 18 2025 (07/18/2025, 04:23:01 UTC)
Source: CVE Database V5
Vendor/Project: biteship
Product: Plugin Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship

Description

The Plugin Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.2.0 via the get_order_detail() due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's orders.

AI-Powered Analysis

AILast updated: 07/18/2025, 04:47:52 UTC

Technical Analysis

CVE-2025-5816 is a security vulnerability identified in the WordPress plugin 'Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship,' which is used to facilitate shipping and courier services integration for WooCommerce stores. The vulnerability is classified as CWE-862: Missing Authorization, specifically an Insecure Direct Object Reference (IDOR) issue. This flaw exists in all versions up to and including 3.2.0 of the plugin. The root cause is the lack of proper validation on a user-controlled key parameter within the get_order_detail() function. Because of this missing authorization check, authenticated users with Subscriber-level access or higher can exploit the vulnerability to access order details belonging to other users without proper permission. The vulnerability does not require elevated privileges beyond Subscriber, nor does it require user interaction beyond authentication. The CVSS v3.1 base score is 4.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, meaning the attack can be performed remotely over the network with low complexity, requires privileges (authenticated user), no user interaction, and impacts confidentiality only (limited to information disclosure). No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. This vulnerability could lead to unauthorized disclosure of customer order information, potentially exposing sensitive data such as customer names, addresses, order contents, and transaction details.

Potential Impact

For European organizations using WooCommerce with the Biteship shipping plugin, this vulnerability poses a risk to customer data confidentiality. Unauthorized access to order details can lead to privacy violations under GDPR, potentially resulting in regulatory fines and reputational damage. E-commerce businesses could face customer trust erosion if order information is leaked. Although the vulnerability does not allow modification or deletion of data, the exposure of personal and transactional information can facilitate further attacks such as social engineering or targeted phishing. The impact is particularly significant for businesses handling large volumes of orders or sensitive customer data. Since the vulnerability requires only Subscriber-level access, an attacker could exploit compromised or fake accounts to harvest order information. This risk is heightened in environments where user registration is open or lightly controlled. The lack of known active exploitation reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is publicly disclosed.

Mitigation Recommendations

European organizations should immediately audit their WooCommerce installations to identify if the Biteship plugin is in use and determine the version deployed. Until an official patch is released, organizations should consider the following mitigations: 1) Restrict user registration and enforce strong authentication controls to limit the creation of unauthorized Subscriber accounts. 2) Implement additional access control layers at the web server or application firewall level to monitor and block suspicious requests targeting order detail endpoints. 3) Review and harden plugin configurations to disable or limit access to order detail APIs if possible. 4) Monitor logs for unusual access patterns indicative of IDOR exploitation attempts. 5) Engage with the plugin vendor or community to obtain or contribute to a security patch addressing the missing authorization check. 6) Consider temporarily disabling the plugin if the risk outweighs operational needs until a fix is available. 7) Educate staff and users about phishing risks that could leverage exposed order data. These steps go beyond generic advice by focusing on access control tightening, monitoring, and vendor engagement specific to this plugin and vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-06T16:32:21.917Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6879ce10a83201eaaceef298

Added to database: 7/18/2025, 4:31:12 AM

Last enriched: 7/18/2025, 4:47:52 AM

Last updated: 8/13/2025, 10:41:10 AM

Views: 10

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats