Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60243: Incorrect Privilege Assignment in Holest Engineering Selling Commander for WooCommerce

0
Critical
VulnerabilityCVE-2025-60243cvecve-2025-60243
Published: Thu Nov 06 2025 (11/06/2025, 15:55:15 UTC)
Source: CVE Database V5
Vendor/Project: Holest Engineering
Product: Selling Commander for WooCommerce

Description

Incorrect Privilege Assignment vulnerability in Holest Engineering Selling Commander for WooCommerce selling-commander-connector allows Privilege Escalation.This issue affects Selling Commander for WooCommerce: from n/a through <= 1.2.46.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:57:32 UTC

Technical Analysis

CVE-2025-60243 is a critical security vulnerability identified in the Selling Commander for WooCommerce plugin developed by Holest Engineering. The flaw stems from incorrect privilege assignment within the 'selling-commander-connector' component, which allows an unauthenticated attacker to escalate privileges without any user interaction. The vulnerability affects all versions up to and including 1.2.46. Exploitation can be performed remotely over the network (AV:N), with low attack complexity (AC:L), no privileges required (PR:N), and no user interaction needed (UI:N). The vulnerability impacts the confidentiality, integrity, and availability of the affected systems, as indicated by the CVSS 3.1 base score of 9.8. This means an attacker can potentially gain administrative control over the WooCommerce environment, manipulate data, disrupt services, or exfiltrate sensitive information. No public exploits are currently known, but the severity and ease of exploitation make it a critical risk. The vulnerability was reserved on 2025-09-25 and published on 2025-11-06. No patches or mitigations are currently linked, so organizations must be vigilant and prepare to apply updates promptly once available.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce with the Selling Commander plugin, this vulnerability poses a significant risk. Successful exploitation could lead to unauthorized administrative access, allowing attackers to manipulate product listings, pricing, customer data, and order information. This can result in financial losses, reputational damage, regulatory non-compliance (e.g., GDPR breaches due to data exposure), and operational disruption. Given the critical nature of the vulnerability and the lack of authentication or user interaction requirements, attackers can automate exploitation attempts, increasing the risk of widespread compromise. The impact extends beyond individual businesses to their customers and partners, potentially affecting supply chains and trust in digital commerce ecosystems across Europe.

Mitigation Recommendations

Organizations should immediately audit their WooCommerce installations to determine if the Selling Commander plugin is in use and identify the version number. Until an official patch is released by Holest Engineering, consider disabling or uninstalling the Selling Commander plugin to eliminate the attack surface. Implement strict network-level access controls to limit exposure of WooCommerce administrative interfaces. Monitor logs and network traffic for unusual or unauthorized access attempts targeting the plugin endpoints. Employ Web Application Firewalls (WAFs) with custom rules to detect and block exploitation patterns related to this vulnerability. Prepare to apply vendor-supplied patches as soon as they become available and test them in staging environments before production deployment. Additionally, review user roles and permissions within WooCommerce to ensure the principle of least privilege is enforced.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-09-25T15:34:44.964Z
Cvss Version
null
State
PUBLISHED

Threat ID: 690cc80cca26fb4dd2f595e5

Added to database: 11/6/2025, 4:08:44 PM

Last enriched: 1/20/2026, 9:57:32 PM

Last updated: 2/5/2026, 8:17:25 PM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats