Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60083: Deserialization of Untrusted Data in add-ons.org PDF Invoice Builder for WooCommerce

0
High
VulnerabilityCVE-2025-60083cvecve-2025-60083
Published: Thu Dec 18 2025 (12/18/2025, 07:22:07 UTC)
Source: CVE Database V5
Vendor/Project: add-ons.org
Product: PDF Invoice Builder for WooCommerce

Description

Deserialization of Untrusted Data vulnerability in add-ons.org PDF Invoice Builder for WooCommerce pdf-for-woocommerce allows Object Injection.This issue affects PDF Invoice Builder for WooCommerce: from n/a through <= 6.3.2.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:39:54 UTC

Technical Analysis

CVE-2025-60083 is a critical deserialization of untrusted data vulnerability found in the PDF Invoice Builder for WooCommerce plugin developed by add-ons.org, affecting all versions up to and including 6.3.2. This vulnerability arises from the plugin's improper handling of serialized data inputs, allowing attackers to inject malicious objects during the deserialization process. Object injection vulnerabilities can lead to severe consequences such as remote code execution, privilege escalation, or arbitrary code execution within the context of the web server. The CVSS 3.1 base score of 8.8 reflects the vulnerability's high impact on confidentiality, integrity, and availability, with an attack vector that is network-based and requires only low privileges, but no user interaction. The plugin is widely used in WooCommerce environments to generate PDF invoices, making it a critical component in e-commerce workflows. Exploiting this vulnerability could allow attackers to manipulate invoice data, access sensitive customer information, or disrupt business operations by executing malicious payloads on the server. Although no known exploits have been reported in the wild yet, the vulnerability's disclosure necessitates immediate attention. The lack of a patch link suggests that a fix may still be pending or in development, emphasizing the need for interim protective measures. The vulnerability was reserved in late September 2025 and published in December 2025, indicating recent discovery and disclosure. Given WooCommerce's popularity in Europe, especially among small and medium-sized enterprises, this vulnerability poses a significant threat to e-commerce platforms reliant on this plugin.

Potential Impact

For European organizations, particularly those operating e-commerce platforms using WooCommerce with the PDF Invoice Builder plugin, this vulnerability presents a substantial risk. Successful exploitation could lead to unauthorized access to sensitive customer and financial data, manipulation or falsification of invoices, and potential disruption of business operations through server compromise. The high severity and network accessibility mean attackers can remotely exploit the vulnerability with minimal privileges, increasing the attack surface. This could result in data breaches subject to GDPR penalties, loss of customer trust, and financial losses. Additionally, the compromise of invoice data integrity could affect accounting and compliance processes. The absence of known exploits currently provides a window for mitigation, but the risk of rapid weaponization remains high. Organizations relying on this plugin should consider the vulnerability a critical threat to their operational security and data protection obligations.

Mitigation Recommendations

1. Monitor official channels from add-ons.org and WooCommerce for the release of a security patch addressing CVE-2025-60083 and apply it immediately upon availability. 2. In the interim, restrict access to the PDF Invoice Builder plugin's functionalities to trusted administrators only, minimizing exposure to low-privilege users. 3. Implement Web Application Firewall (WAF) rules to detect and block suspicious serialized data payloads targeting the plugin endpoints. 4. Conduct thorough audits of WooCommerce installations to identify the presence and version of the PDF Invoice Builder plugin and remove or disable it if not essential. 5. Enhance logging and monitoring around invoice generation and plugin activity to detect anomalous behavior indicative of exploitation attempts. 6. Educate development and security teams about the risks of deserialization vulnerabilities and review custom code for similar issues. 7. Employ network segmentation and least privilege principles to limit the impact of potential compromise. 8. Prepare incident response plans specific to e-commerce data breaches and server compromises involving WooCommerce environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:20:02.782Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6943b04e4eb3efac36700385

Added to database: 12/18/2025, 7:42:06 AM

Last enriched: 1/20/2026, 9:39:54 PM

Last updated: 2/8/2026, 8:04:37 AM

Views: 52

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats