Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64267: Exposure of Sensitive System Information to an Unauthorized Control Sphere in WPSwings WooCommerce Ultimate Points And Rewards

0
Medium
VulnerabilityCVE-2025-64267cvecve-2025-64267
Published: Thu Nov 13 2025 (11/13/2025, 09:24:29 UTC)
Source: CVE Database V5
Vendor/Project: WPSwings
Product: WooCommerce Ultimate Points And Rewards

Description

Exposure of Sensitive System Information to an Unauthorized Control Sphere vulnerability in WPSwings WooCommerce Ultimate Points And Rewards woocommerce-ultimate-points-and-rewards allows Retrieve Embedded Sensitive Data.This issue affects WooCommerce Ultimate Points And Rewards: from n/a through <= 2.10.2.

AI-Powered Analysis

AILast updated: 01/20/2026, 23:55:36 UTC

Technical Analysis

CVE-2025-64267 is a vulnerability identified in the WPSwings WooCommerce Ultimate Points And Rewards plugin, which is widely used to manage loyalty points and rewards in WooCommerce-based e-commerce stores. The flaw allows an attacker without any privileges (PR:N) to retrieve sensitive system information embedded within the plugin or its environment, potentially including configuration details or other data that should not be exposed. The attack vector is network-based (AV:N), meaning the attacker can exploit it remotely, but it requires user interaction (UI:R), such as tricking a user into clicking a malicious link or visiting a crafted page. The vulnerability does not affect the integrity or availability of the system but compromises confidentiality to a limited extent (C:L/I:N/A:N). The plugin versions up to and including 2.10.2 are affected, with no patch currently available at the time of publication. Although no known exploits are reported in the wild, the exposure of sensitive information can facilitate further targeted attacks, such as social engineering or privilege escalation. The vulnerability was reserved and published in late 2025, with the CVSS v3.1 score calculated at 4.3, indicating a medium severity level. The lack of authentication requirements and the network attack vector increase the risk profile, but the need for user interaction and limited impact on core system functions reduce the overall criticality.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce with the affected plugin, this vulnerability poses a risk of sensitive information leakage. Such information could include system configuration, API keys, or internal URLs that attackers might leverage for further exploitation, such as gaining unauthorized access or conducting phishing campaigns. While the direct impact on system integrity and availability is minimal, the confidentiality breach can undermine customer trust and lead to compliance issues under regulations like GDPR if personal data or system details are indirectly exposed. The medium severity rating suggests a moderate risk, but the widespread use of WooCommerce in Europe means many small to medium enterprises could be vulnerable. Attackers could use this vulnerability as a reconnaissance tool to identify weaknesses in the e-commerce infrastructure, potentially leading to more severe attacks. The absence of known exploits currently reduces immediate risk but does not eliminate the threat, especially as threat actors often develop exploits following public disclosure.

Mitigation Recommendations

Organizations should prioritize updating the WooCommerce Ultimate Points And Rewards plugin to a patched version once it becomes available from WPSwings. Until a patch is released, administrators should implement strict access controls to limit exposure of the plugin’s endpoints, such as restricting access by IP address or requiring authentication for sensitive plugin functions. Web Application Firewalls (WAFs) can be configured to detect and block suspicious requests targeting the plugin. Monitoring web server logs for unusual access patterns or repeated requests to plugin-related URLs can help identify exploitation attempts early. Additionally, educating users about the risks of clicking unknown links can reduce the likelihood of successful user interaction-based attacks. Regular security audits and vulnerability scanning focused on WordPress plugins should be conducted to detect similar issues proactively. Finally, organizations should review their data exposure policies and ensure sensitive information is not unnecessarily embedded or exposed within plugins or themes.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-29T03:08:22.609Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6915aa33dac9b42fc37a58a7

Added to database: 11/13/2025, 9:51:47 AM

Last enriched: 1/20/2026, 11:55:36 PM

Last updated: 2/7/2026, 1:28:19 PM

Views: 61

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats