Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62884: Missing Authorization in Elliot Sowersby / RelyWP Coupon Affiliates

0
Medium
VulnerabilityCVE-2025-62884cvecve-2025-62884
Published: Mon Oct 27 2025 (10/27/2025, 01:33:43 UTC)
Source: CVE Database V5
Vendor/Project: Elliot Sowersby / RelyWP
Product: Coupon Affiliates

Description

Missing Authorization vulnerability in Elliot Sowersby / RelyWP Coupon Affiliates woo-coupon-usage allows Accessing Functionality Not Properly Constrained by ACLs.This issue affects Coupon Affiliates: from n/a through <= 7.0.3.

AI-Powered Analysis

AILast updated: 01/20/2026, 22:44:12 UTC

Technical Analysis

CVE-2025-62884 identifies a missing authorization vulnerability in the Coupon Affiliates plugin developed by Elliot Sowersby / RelyWP, specifically affecting versions up to and including 7.0.3. This plugin integrates with WooCommerce to manage coupon affiliate marketing, enabling merchants to track and incentivize coupon usage. The vulnerability arises because certain functions within the plugin lack proper access control enforcement, allowing unauthenticated attackers to invoke these functions without passing through the expected authorization checks. According to the CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N), the attack can be performed remotely over the network without any privileges or user interaction, with low complexity. The impact is limited to a confidentiality breach, likely exposing coupon usage data or affiliate tracking information, but does not affect data integrity or system availability. No known exploits have been reported in the wild, and no patches are currently linked, indicating the vulnerability is newly disclosed. The lack of proper ACL enforcement could allow attackers to gather sensitive marketing data or manipulate coupon-related workflows, potentially undermining business operations or affiliate trust. The plugin is commonly used in WooCommerce-based e-commerce sites, which are prevalent across Europe, making this a relevant threat for online retailers relying on affiliate coupon marketing.

Potential Impact

For European organizations, particularly e-commerce businesses using WooCommerce with the Coupon Affiliates plugin, this vulnerability poses a risk of unauthorized access to coupon affiliate data and functionalities. While it does not directly compromise system integrity or availability, exposure of coupon usage information could lead to competitive disadvantages, loss of affiliate trust, or enable fraudulent coupon redemption schemes. This could result in financial losses and reputational damage. Since the vulnerability requires no authentication and no user interaction, attackers can exploit it remotely, increasing the risk of automated scanning and exploitation attempts. The impact is more pronounced for organizations heavily reliant on affiliate marketing and coupon campaigns, as unauthorized access could disrupt marketing analytics and affiliate payouts. Additionally, regulatory considerations such as GDPR may be implicated if personal data related to affiliates or customers is exposed. Overall, the threat could undermine the confidentiality of marketing data and indirectly affect business operations in the European e-commerce sector.

Mitigation Recommendations

Organizations should monitor for official patches or updates from Elliot Sowersby / RelyWP and apply them promptly once available. Until patches are released, it is advisable to restrict access to the Coupon Affiliates plugin endpoints using web application firewalls (WAFs) or reverse proxies, limiting access to trusted IPs or authenticated users where possible. Conduct thorough audits of plugin usage and logs to detect any anomalous or unauthorized coupon-related activity. Consider temporarily disabling the plugin if it is not critical to business operations or if mitigating controls cannot be implemented. Additionally, review and tighten WooCommerce and WordPress user roles and permissions to minimize exposure. Employ network-level monitoring and intrusion detection systems to identify potential exploitation attempts. Finally, maintain regular backups and ensure incident response plans include scenarios involving unauthorized access to marketing or affiliate systems.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-10-24T14:24:07.765Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68fed02d23a7bbed324acb27

Added to database: 10/27/2025, 1:51:41 AM

Last enriched: 1/20/2026, 10:44:12 PM

Last updated: 2/7/2026, 2:54:17 PM

Views: 47

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats