CVE-2025-5816: CWE-862 Missing Authorization in biteship Plugin Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship
The Plugin Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.2.0 via the get_order_detail() due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's orders.
AI Analysis
Technical Summary
CVE-2025-5816 is a security vulnerability identified in the WordPress plugin 'Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship,' which is used to facilitate shipping and courier services integration for WooCommerce stores. The vulnerability is classified as CWE-862: Missing Authorization, specifically an Insecure Direct Object Reference (IDOR) issue. This flaw exists in all versions up to and including 3.2.0 of the plugin. The root cause is the lack of proper validation on a user-controlled key parameter within the get_order_detail() function. Because of this missing authorization check, authenticated users with Subscriber-level access or higher can exploit the vulnerability to access order details belonging to other users without proper permission. The vulnerability does not require elevated privileges beyond Subscriber, nor does it require user interaction beyond authentication. The CVSS v3.1 base score is 4.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, meaning the attack can be performed remotely over the network with low complexity, requires privileges (authenticated user), no user interaction, and impacts confidentiality only (limited to information disclosure). No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. This vulnerability could lead to unauthorized disclosure of customer order information, potentially exposing sensitive data such as customer names, addresses, order contents, and transaction details.
Potential Impact
For European organizations using WooCommerce with the Biteship shipping plugin, this vulnerability poses a risk to customer data confidentiality. Unauthorized access to order details can lead to privacy violations under GDPR, potentially resulting in regulatory fines and reputational damage. E-commerce businesses could face customer trust erosion if order information is leaked. Although the vulnerability does not allow modification or deletion of data, the exposure of personal and transactional information can facilitate further attacks such as social engineering or targeted phishing. The impact is particularly significant for businesses handling large volumes of orders or sensitive customer data. Since the vulnerability requires only Subscriber-level access, an attacker could exploit compromised or fake accounts to harvest order information. This risk is heightened in environments where user registration is open or lightly controlled. The lack of known active exploitation reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is publicly disclosed.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify if the Biteship plugin is in use and determine the version deployed. Until an official patch is released, organizations should consider the following mitigations: 1) Restrict user registration and enforce strong authentication controls to limit the creation of unauthorized Subscriber accounts. 2) Implement additional access control layers at the web server or application firewall level to monitor and block suspicious requests targeting order detail endpoints. 3) Review and harden plugin configurations to disable or limit access to order detail APIs if possible. 4) Monitor logs for unusual access patterns indicative of IDOR exploitation attempts. 5) Engage with the plugin vendor or community to obtain or contribute to a security patch addressing the missing authorization check. 6) Consider temporarily disabling the plugin if the risk outweighs operational needs until a fix is available. 7) Educate staff and users about phishing risks that could leverage exposed order data. These steps go beyond generic advice by focusing on access control tightening, monitoring, and vendor engagement specific to this plugin and vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-5816: CWE-862 Missing Authorization in biteship Plugin Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship
Description
The Plugin Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 3.2.0 via the get_order_detail() due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's orders.
AI-Powered Analysis
Technical Analysis
CVE-2025-5816 is a security vulnerability identified in the WordPress plugin 'Pengiriman WooCommerce Kurir Reguler, Instan, Kargo – Biteship,' which is used to facilitate shipping and courier services integration for WooCommerce stores. The vulnerability is classified as CWE-862: Missing Authorization, specifically an Insecure Direct Object Reference (IDOR) issue. This flaw exists in all versions up to and including 3.2.0 of the plugin. The root cause is the lack of proper validation on a user-controlled key parameter within the get_order_detail() function. Because of this missing authorization check, authenticated users with Subscriber-level access or higher can exploit the vulnerability to access order details belonging to other users without proper permission. The vulnerability does not require elevated privileges beyond Subscriber, nor does it require user interaction beyond authentication. The CVSS v3.1 base score is 4.3, indicating a medium severity level, with the vector AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N, meaning the attack can be performed remotely over the network with low complexity, requires privileges (authenticated user), no user interaction, and impacts confidentiality only (limited to information disclosure). No known exploits are reported in the wild yet, and no patches have been linked at the time of publication. This vulnerability could lead to unauthorized disclosure of customer order information, potentially exposing sensitive data such as customer names, addresses, order contents, and transaction details.
Potential Impact
For European organizations using WooCommerce with the Biteship shipping plugin, this vulnerability poses a risk to customer data confidentiality. Unauthorized access to order details can lead to privacy violations under GDPR, potentially resulting in regulatory fines and reputational damage. E-commerce businesses could face customer trust erosion if order information is leaked. Although the vulnerability does not allow modification or deletion of data, the exposure of personal and transactional information can facilitate further attacks such as social engineering or targeted phishing. The impact is particularly significant for businesses handling large volumes of orders or sensitive customer data. Since the vulnerability requires only Subscriber-level access, an attacker could exploit compromised or fake accounts to harvest order information. This risk is heightened in environments where user registration is open or lightly controlled. The lack of known active exploitation reduces immediate risk but does not eliminate the threat, especially as attackers may develop exploits once the vulnerability is publicly disclosed.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify if the Biteship plugin is in use and determine the version deployed. Until an official patch is released, organizations should consider the following mitigations: 1) Restrict user registration and enforce strong authentication controls to limit the creation of unauthorized Subscriber accounts. 2) Implement additional access control layers at the web server or application firewall level to monitor and block suspicious requests targeting order detail endpoints. 3) Review and harden plugin configurations to disable or limit access to order detail APIs if possible. 4) Monitor logs for unusual access patterns indicative of IDOR exploitation attempts. 5) Engage with the plugin vendor or community to obtain or contribute to a security patch addressing the missing authorization check. 6) Consider temporarily disabling the plugin if the risk outweighs operational needs until a fix is available. 7) Educate staff and users about phishing risks that could leverage exposed order data. These steps go beyond generic advice by focusing on access control tightening, monitoring, and vendor engagement specific to this plugin and vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-06T16:32:21.917Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6879ce10a83201eaaceef298
Added to database: 7/18/2025, 4:31:12 AM
Last enriched: 7/18/2025, 4:47:52 AM
Last updated: 8/13/2025, 10:41:10 AM
Views: 10
Related Threats
CVE-2025-9091: Hard-coded Credentials in Tenda AC20
LowCVE-2025-9090: Command Injection in Tenda AC20
MediumCVE-2025-9092: CWE-400 Uncontrolled Resource Consumption in Legion of the Bouncy Castle Inc. Bouncy Castle for Java - BC-FJA 2.1.0
LowCVE-2025-9089: Stack-based Buffer Overflow in Tenda AC20
HighCVE-2025-9088: Stack-based Buffer Overflow in Tenda AC20
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.