CVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce
Missing Authorization vulnerability in Premmerce Premmerce Wholesale Pricing for WooCommerce premmerce-woocommerce-wholesale-pricing allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Premmerce Wholesale Pricing for WooCommerce: from n/a through <= 1.1.10.
AI Analysis
Technical Summary
CVE-2025-64285 identifies a missing authorization vulnerability in the Premmerce Wholesale Pricing plugin for WooCommerce, specifically in versions up to and including 1.1.10. The vulnerability arises from incorrectly configured access control security levels, allowing unauthorized users to exploit the plugin's wholesale pricing features without proper permissions. This could enable attackers to alter wholesale pricing data, potentially leading to financial losses or disruption of business operations. The flaw does not require authentication, meaning any user or attacker with access to the WooCommerce environment could exploit it. The plugin is widely used by e-commerce sites running WooCommerce to manage wholesale pricing tiers and discounts. Although no public exploits have been reported yet, the vulnerability's nature makes it a significant risk for online retailers. The lack of a CVSS score necessitates an assessment based on impact and exploitability, which suggests a high severity due to the potential for unauthorized price manipulation and the ease of exploitation. The vulnerability was published on October 29, 2025, and no patches or mitigations have been officially released at the time of this report. Organizations using this plugin should be vigilant and prepare to apply updates or implement compensating controls.
Potential Impact
For European organizations, this vulnerability poses a direct threat to e-commerce platforms using WooCommerce with the Premmerce Wholesale Pricing plugin. Unauthorized modification of wholesale prices can lead to significant financial losses, reputational damage, and operational disruptions. Wholesale customers might be offered incorrect pricing, which could result in revenue leakage or contractual disputes. Additionally, attackers could manipulate pricing to create confusion or gain unfair competitive advantages. The impact extends to supply chain relationships and customer trust, especially for businesses heavily reliant on wholesale transactions. Given the prevalence of WooCommerce in Europe’s e-commerce market, especially in countries with mature online retail sectors, the threat could affect a broad range of businesses from SMEs to large enterprises. The absence of authentication requirements lowers the barrier for exploitation, increasing the likelihood of attacks. Furthermore, compromised pricing data could be used as a stepping stone for further attacks within the affected e-commerce environment.
Mitigation Recommendations
1. Monitor official Premmerce and WooCommerce channels for patches addressing CVE-2025-64285 and apply updates immediately upon release. 2. Until a patch is available, restrict access to the WooCommerce administrative interface and specifically to the Premmerce Wholesale Pricing plugin settings to trusted personnel only. 3. Implement strict role-based access controls (RBAC) to limit who can modify wholesale pricing configurations. 4. Enable detailed logging and monitoring of changes to pricing data and plugin settings to detect unauthorized modifications promptly. 5. Conduct regular audits of user permissions and plugin configurations to ensure no unauthorized access paths exist. 6. Consider deploying web application firewalls (WAF) with custom rules to block suspicious requests targeting the plugin’s endpoints. 7. Educate staff about the risks associated with unauthorized access and encourage reporting of unusual system behavior. 8. If feasible, isolate the WooCommerce environment or use staging environments to test plugin updates before production deployment. 9. Review and harden the overall WooCommerce installation security posture, including keeping all plugins and themes up to date.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce
Description
Missing Authorization vulnerability in Premmerce Premmerce Wholesale Pricing for WooCommerce premmerce-woocommerce-wholesale-pricing allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Premmerce Wholesale Pricing for WooCommerce: from n/a through <= 1.1.10.
AI-Powered Analysis
Technical Analysis
CVE-2025-64285 identifies a missing authorization vulnerability in the Premmerce Wholesale Pricing plugin for WooCommerce, specifically in versions up to and including 1.1.10. The vulnerability arises from incorrectly configured access control security levels, allowing unauthorized users to exploit the plugin's wholesale pricing features without proper permissions. This could enable attackers to alter wholesale pricing data, potentially leading to financial losses or disruption of business operations. The flaw does not require authentication, meaning any user or attacker with access to the WooCommerce environment could exploit it. The plugin is widely used by e-commerce sites running WooCommerce to manage wholesale pricing tiers and discounts. Although no public exploits have been reported yet, the vulnerability's nature makes it a significant risk for online retailers. The lack of a CVSS score necessitates an assessment based on impact and exploitability, which suggests a high severity due to the potential for unauthorized price manipulation and the ease of exploitation. The vulnerability was published on October 29, 2025, and no patches or mitigations have been officially released at the time of this report. Organizations using this plugin should be vigilant and prepare to apply updates or implement compensating controls.
Potential Impact
For European organizations, this vulnerability poses a direct threat to e-commerce platforms using WooCommerce with the Premmerce Wholesale Pricing plugin. Unauthorized modification of wholesale prices can lead to significant financial losses, reputational damage, and operational disruptions. Wholesale customers might be offered incorrect pricing, which could result in revenue leakage or contractual disputes. Additionally, attackers could manipulate pricing to create confusion or gain unfair competitive advantages. The impact extends to supply chain relationships and customer trust, especially for businesses heavily reliant on wholesale transactions. Given the prevalence of WooCommerce in Europe’s e-commerce market, especially in countries with mature online retail sectors, the threat could affect a broad range of businesses from SMEs to large enterprises. The absence of authentication requirements lowers the barrier for exploitation, increasing the likelihood of attacks. Furthermore, compromised pricing data could be used as a stepping stone for further attacks within the affected e-commerce environment.
Mitigation Recommendations
1. Monitor official Premmerce and WooCommerce channels for patches addressing CVE-2025-64285 and apply updates immediately upon release. 2. Until a patch is available, restrict access to the WooCommerce administrative interface and specifically to the Premmerce Wholesale Pricing plugin settings to trusted personnel only. 3. Implement strict role-based access controls (RBAC) to limit who can modify wholesale pricing configurations. 4. Enable detailed logging and monitoring of changes to pricing data and plugin settings to detect unauthorized modifications promptly. 5. Conduct regular audits of user permissions and plugin configurations to ensure no unauthorized access paths exist. 6. Consider deploying web application firewalls (WAF) with custom rules to block suspicious requests targeting the plugin’s endpoints. 7. Educate staff about the risks associated with unauthorized access and encourage reporting of unusual system behavior. 8. If feasible, isolate the WooCommerce environment or use staging environments to test plugin updates before production deployment. 9. Review and harden the overall WooCommerce installation security posture, including keeping all plugins and themes up to date.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-29T03:29:08.849Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6901d66086d093201c2b623c
Added to database: 10/29/2025, 8:54:56 AM
Last enriched: 10/29/2025, 9:10:35 AM
Last updated: 10/29/2025, 10:24:30 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-12450: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in litespeedtech LiteSpeed Cache
MediumCVE-2025-64291: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce User Roles
UnknownCVE-2025-64290: Cross-Site Request Forgery (CSRF) in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64289: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in Premmerce Premmerce Product Search for WooCommerce
UnknownCVE-2025-64286: Cross-Site Request Forgery (CSRF) in WpEstate WP Rentals
UnknownActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.