CVE-2025-6215: CWE-862 Missing Authorization in omnishop Omnishop – Mobile shop apps complementing your WooCommerce webshop
The Omnishop plugin for WordPress is vulnerable to Unauthenticated Registration Bypass in all versions up to, and including, 1.0.9. Its /users/register endpoint is exposed to the public (permission_callback always returns true) and invokes wp_create_user() unconditionally, ignoring the site’s users_can_register option and any nonce or CAPTCHA checks. This makes it possible for unauthenticated attackers to create arbitrary user accounts (customer) on sites where registrations should be closed.
AI Analysis
Technical Summary
CVE-2025-6215 is a medium-severity vulnerability affecting the Omnishop plugin for WordPress, which complements WooCommerce webshops by providing mobile shop app functionality. The vulnerability is classified under CWE-862 (Missing Authorization) and impacts all versions up to and including 1.0.9. The core issue lies in the /users/register endpoint of the plugin, where the permission_callback function always returns true, effectively exposing this endpoint to unauthenticated public access. This endpoint calls the WordPress function wp_create_user() without any conditional checks, ignoring the site's users_can_register setting as well as any nonce or CAPTCHA protections that would normally prevent unauthorized registrations. As a result, an unauthenticated attacker can create arbitrary user accounts with the 'customer' role on affected sites even if user registration is supposed to be disabled. This bypasses intended access controls and can lead to unauthorized account creation, potentially facilitating further malicious activities such as spam, fraudulent transactions, or privilege escalation attempts if combined with other vulnerabilities. The CVSS 3.1 base score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to integrity (unauthorized account creation) without direct confidentiality or availability effects. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may require vendor updates or manual intervention.
Potential Impact
For European organizations using the Omnishop plugin integrated with WooCommerce, this vulnerability poses a risk of unauthorized user registrations that can undermine the integrity of their e-commerce platforms. Attackers could create multiple fake customer accounts, potentially leading to fraudulent orders, abuse of promotional offers, or manipulation of customer data. This could erode customer trust and damage brand reputation. Additionally, unauthorized accounts might be leveraged as footholds for further attacks, such as social engineering or privilege escalation if other vulnerabilities exist. Since WooCommerce is widely used across Europe, especially by small and medium-sized enterprises (SMEs) operating online shops, the risk is significant for businesses relying on Omnishop for mobile app integration. The lack of authentication and bypass of registration controls could also complicate compliance with European data protection regulations like GDPR, as unauthorized accounts may lead to improper handling of personal data. However, the absence of direct confidentiality or availability impact limits the scope of damage to integrity and operational trust.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Omnishop plugin and verify the version in use. Until an official patch is released, administrators should consider disabling the Omnishop plugin or restricting access to the /users/register endpoint via web application firewall (WAF) rules or server-level access controls to prevent unauthenticated registrations. Implementing additional CAPTCHA or multi-factor verification at the registration endpoint, if possible, can help mitigate automated abuse. Monitoring user registration logs for unusual spikes or suspicious account creation patterns is advisable. Organizations should also review their user management policies and consider manual verification of new accounts during this period. Promptly applying vendor patches once available is critical. Additionally, security teams should conduct penetration testing focused on user registration flows to identify any other authorization weaknesses. Finally, updating WordPress core and WooCommerce to the latest versions can reduce the risk of chained exploits.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Poland, Sweden, Belgium, Austria
CVE-2025-6215: CWE-862 Missing Authorization in omnishop Omnishop – Mobile shop apps complementing your WooCommerce webshop
Description
The Omnishop plugin for WordPress is vulnerable to Unauthenticated Registration Bypass in all versions up to, and including, 1.0.9. Its /users/register endpoint is exposed to the public (permission_callback always returns true) and invokes wp_create_user() unconditionally, ignoring the site’s users_can_register option and any nonce or CAPTCHA checks. This makes it possible for unauthenticated attackers to create arbitrary user accounts (customer) on sites where registrations should be closed.
AI-Powered Analysis
Technical Analysis
CVE-2025-6215 is a medium-severity vulnerability affecting the Omnishop plugin for WordPress, which complements WooCommerce webshops by providing mobile shop app functionality. The vulnerability is classified under CWE-862 (Missing Authorization) and impacts all versions up to and including 1.0.9. The core issue lies in the /users/register endpoint of the plugin, where the permission_callback function always returns true, effectively exposing this endpoint to unauthenticated public access. This endpoint calls the WordPress function wp_create_user() without any conditional checks, ignoring the site's users_can_register setting as well as any nonce or CAPTCHA protections that would normally prevent unauthorized registrations. As a result, an unauthenticated attacker can create arbitrary user accounts with the 'customer' role on affected sites even if user registration is supposed to be disabled. This bypasses intended access controls and can lead to unauthorized account creation, potentially facilitating further malicious activities such as spam, fraudulent transactions, or privilege escalation attempts if combined with other vulnerabilities. The CVSS 3.1 base score is 5.3, reflecting a medium severity with network attack vector, low attack complexity, no privileges required, and no user interaction needed. The impact is limited to integrity (unauthorized account creation) without direct confidentiality or availability effects. No known exploits are currently reported in the wild, and no patches have been linked yet, indicating that mitigation may require vendor updates or manual intervention.
Potential Impact
For European organizations using the Omnishop plugin integrated with WooCommerce, this vulnerability poses a risk of unauthorized user registrations that can undermine the integrity of their e-commerce platforms. Attackers could create multiple fake customer accounts, potentially leading to fraudulent orders, abuse of promotional offers, or manipulation of customer data. This could erode customer trust and damage brand reputation. Additionally, unauthorized accounts might be leveraged as footholds for further attacks, such as social engineering or privilege escalation if other vulnerabilities exist. Since WooCommerce is widely used across Europe, especially by small and medium-sized enterprises (SMEs) operating online shops, the risk is significant for businesses relying on Omnishop for mobile app integration. The lack of authentication and bypass of registration controls could also complicate compliance with European data protection regulations like GDPR, as unauthorized accounts may lead to improper handling of personal data. However, the absence of direct confidentiality or availability impact limits the scope of damage to integrity and operational trust.
Mitigation Recommendations
European organizations should immediately audit their WordPress installations to identify the presence of the Omnishop plugin and verify the version in use. Until an official patch is released, administrators should consider disabling the Omnishop plugin or restricting access to the /users/register endpoint via web application firewall (WAF) rules or server-level access controls to prevent unauthenticated registrations. Implementing additional CAPTCHA or multi-factor verification at the registration endpoint, if possible, can help mitigate automated abuse. Monitoring user registration logs for unusual spikes or suspicious account creation patterns is advisable. Organizations should also review their user management policies and consider manual verification of new accounts during this period. Promptly applying vendor patches once available is critical. Additionally, security teams should conduct penetration testing focused on user registration flows to identify any other authorization weaknesses. Finally, updating WordPress core and WooCommerce to the latest versions can reduce the risk of chained exploits.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-17T21:45:34.183Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 68804d50ad5a09ad00065fe5
Added to database: 7/23/2025, 2:47:44 AM
Last enriched: 7/23/2025, 3:03:34 AM
Last updated: 7/23/2025, 5:00:31 AM
Views: 3
Related Threats
CVE-2025-3549: Heap-based Buffer Overflow in Open Asset Import Library Assimp
MediumCVE-2025-3548: Heap-based Buffer Overflow in Open Asset Import Library Assimp
MediumCVE-2025-3196: Stack-based Buffer Overflow in Open Asset Import Library Assimp
MediumCVE-2025-41687: CWE-121 Stack-based Buffer Overflow in Weidmueller IE-SR-2TX-WL
CriticalCVE-2025-41684: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Weidmueller IE-SR-2TX-WL
HighActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.