CVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce
Missing Authorization vulnerability in Premmerce Premmerce Wholesale Pricing for WooCommerce premmerce-woocommerce-wholesale-pricing allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Premmerce Wholesale Pricing for WooCommerce: from n/a through <= 1.1.10.
AI Analysis
Technical Summary
CVE-2025-64285 identifies a missing authorization vulnerability in the Premmerce Wholesale Pricing plugin for WooCommerce, specifically versions up to and including 1.1.10. This vulnerability arises from incorrectly configured access control mechanisms within the plugin, allowing users with limited privileges to perform unauthorized actions related to wholesale pricing data. The flaw does not require user interaction and can be exploited remotely over the network, but it does require the attacker to have some level of privileges (PR:L) within the WooCommerce environment. The CVSS v3.1 score of 5.4 (medium severity) reflects the potential for limited confidentiality and integrity impacts without affecting availability. Exploiting this vulnerability could allow an attacker to view or modify wholesale pricing information, potentially leading to financial discrepancies, unauthorized discounts, or leakage of sensitive pricing strategies. No known public exploits or patches are currently available, indicating the need for vigilance and proactive mitigation. The vulnerability is particularly relevant to e-commerce platforms using WooCommerce with the Premmerce Wholesale Pricing plugin, which is popular among online retailers managing wholesale customer pricing tiers.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce with the Premmerce Wholesale Pricing plugin, this vulnerability poses a risk to the confidentiality and integrity of wholesale pricing data. Unauthorized access could lead to exposure of sensitive pricing information or unauthorized price modifications, resulting in financial losses, reputational damage, and potential regulatory scrutiny under data protection laws such as GDPR if customer data is indirectly affected. The impact is more pronounced for businesses with complex wholesale pricing models or large wholesale customer bases. While availability is not affected, the integrity compromise could disrupt business operations and trust with wholesale clients. Given the widespread use of WooCommerce in Europe, particularly in countries with strong e-commerce sectors, the threat could affect a significant number of organizations if left unmitigated.
Mitigation Recommendations
1. Monitor Premmerce and WooCommerce vendor channels closely for official patches addressing CVE-2025-64285 and apply them promptly upon release. 2. Until patches are available, restrict access to the Premmerce Wholesale Pricing plugin features to only trusted and necessary users by implementing strict role-based access controls within WooCommerce. 3. Conduct thorough audits of user privileges and plugin configurations to ensure no excessive permissions are granted that could be exploited. 4. Implement network-level protections such as web application firewalls (WAF) to detect and block suspicious requests targeting the plugin's endpoints. 5. Enable detailed logging and monitoring of plugin-related activities to quickly identify unauthorized access attempts or anomalous changes to wholesale pricing data. 6. Educate administrative users about the risks and encourage prompt reporting of unusual behavior. 7. Consider isolating the e-commerce environment or using segmentation to limit the blast radius in case of exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce
Description
Missing Authorization vulnerability in Premmerce Premmerce Wholesale Pricing for WooCommerce premmerce-woocommerce-wholesale-pricing allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Premmerce Wholesale Pricing for WooCommerce: from n/a through <= 1.1.10.
AI-Powered Analysis
Technical Analysis
CVE-2025-64285 identifies a missing authorization vulnerability in the Premmerce Wholesale Pricing plugin for WooCommerce, specifically versions up to and including 1.1.10. This vulnerability arises from incorrectly configured access control mechanisms within the plugin, allowing users with limited privileges to perform unauthorized actions related to wholesale pricing data. The flaw does not require user interaction and can be exploited remotely over the network, but it does require the attacker to have some level of privileges (PR:L) within the WooCommerce environment. The CVSS v3.1 score of 5.4 (medium severity) reflects the potential for limited confidentiality and integrity impacts without affecting availability. Exploiting this vulnerability could allow an attacker to view or modify wholesale pricing information, potentially leading to financial discrepancies, unauthorized discounts, or leakage of sensitive pricing strategies. No known public exploits or patches are currently available, indicating the need for vigilance and proactive mitigation. The vulnerability is particularly relevant to e-commerce platforms using WooCommerce with the Premmerce Wholesale Pricing plugin, which is popular among online retailers managing wholesale customer pricing tiers.
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce with the Premmerce Wholesale Pricing plugin, this vulnerability poses a risk to the confidentiality and integrity of wholesale pricing data. Unauthorized access could lead to exposure of sensitive pricing information or unauthorized price modifications, resulting in financial losses, reputational damage, and potential regulatory scrutiny under data protection laws such as GDPR if customer data is indirectly affected. The impact is more pronounced for businesses with complex wholesale pricing models or large wholesale customer bases. While availability is not affected, the integrity compromise could disrupt business operations and trust with wholesale clients. Given the widespread use of WooCommerce in Europe, particularly in countries with strong e-commerce sectors, the threat could affect a significant number of organizations if left unmitigated.
Mitigation Recommendations
1. Monitor Premmerce and WooCommerce vendor channels closely for official patches addressing CVE-2025-64285 and apply them promptly upon release. 2. Until patches are available, restrict access to the Premmerce Wholesale Pricing plugin features to only trusted and necessary users by implementing strict role-based access controls within WooCommerce. 3. Conduct thorough audits of user privileges and plugin configurations to ensure no excessive permissions are granted that could be exploited. 4. Implement network-level protections such as web application firewalls (WAF) to detect and block suspicious requests targeting the plugin's endpoints. 5. Enable detailed logging and monitoring of plugin-related activities to quickly identify unauthorized access attempts or anomalous changes to wholesale pricing data. 6. Educate administrative users about the risks and encourage prompt reporting of unusual behavior. 7. Consider isolating the e-commerce environment or using segmentation to limit the blast radius in case of exploitation.
Affected Countries
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-29T03:29:08.849Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6901d66086d093201c2b623c
Added to database: 10/29/2025, 8:54:56 AM
Last enriched: 1/20/2026, 11:58:55 PM
Last updated: 2/7/2026, 3:14:00 PM
Views: 151
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2088: SQL Injection in PHPGurukul Beauty Parlour Management System
MediumCVE-2026-2087: SQL Injection in SourceCodester Online Class Record System
MediumCVE-2026-2086: Buffer Overflow in UTT HiPER 810G
HighOrganizations Urged to Replace Discontinued Edge Devices
MediumCVE-2026-2085: Command Injection in D-Link DWR-M921
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.