Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64285: Missing Authorization in Premmerce Premmerce Wholesale Pricing for WooCommerce

0
Medium
VulnerabilityCVE-2025-64285cvecve-2025-64285
Published: Wed Oct 29 2025 (10/29/2025, 08:38:13 UTC)
Source: CVE Database V5
Vendor/Project: Premmerce
Product: Premmerce Wholesale Pricing for WooCommerce

Description

Missing Authorization vulnerability in Premmerce Premmerce Wholesale Pricing for WooCommerce premmerce-woocommerce-wholesale-pricing allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Premmerce Wholesale Pricing for WooCommerce: from n/a through <= 1.1.10.

AI-Powered Analysis

AILast updated: 01/20/2026, 23:58:55 UTC

Technical Analysis

CVE-2025-64285 identifies a missing authorization vulnerability in the Premmerce Wholesale Pricing plugin for WooCommerce, specifically versions up to and including 1.1.10. This vulnerability arises from incorrectly configured access control mechanisms within the plugin, allowing users with limited privileges to perform unauthorized actions related to wholesale pricing data. The flaw does not require user interaction and can be exploited remotely over the network, but it does require the attacker to have some level of privileges (PR:L) within the WooCommerce environment. The CVSS v3.1 score of 5.4 (medium severity) reflects the potential for limited confidentiality and integrity impacts without affecting availability. Exploiting this vulnerability could allow an attacker to view or modify wholesale pricing information, potentially leading to financial discrepancies, unauthorized discounts, or leakage of sensitive pricing strategies. No known public exploits or patches are currently available, indicating the need for vigilance and proactive mitigation. The vulnerability is particularly relevant to e-commerce platforms using WooCommerce with the Premmerce Wholesale Pricing plugin, which is popular among online retailers managing wholesale customer pricing tiers.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce with the Premmerce Wholesale Pricing plugin, this vulnerability poses a risk to the confidentiality and integrity of wholesale pricing data. Unauthorized access could lead to exposure of sensitive pricing information or unauthorized price modifications, resulting in financial losses, reputational damage, and potential regulatory scrutiny under data protection laws such as GDPR if customer data is indirectly affected. The impact is more pronounced for businesses with complex wholesale pricing models or large wholesale customer bases. While availability is not affected, the integrity compromise could disrupt business operations and trust with wholesale clients. Given the widespread use of WooCommerce in Europe, particularly in countries with strong e-commerce sectors, the threat could affect a significant number of organizations if left unmitigated.

Mitigation Recommendations

1. Monitor Premmerce and WooCommerce vendor channels closely for official patches addressing CVE-2025-64285 and apply them promptly upon release. 2. Until patches are available, restrict access to the Premmerce Wholesale Pricing plugin features to only trusted and necessary users by implementing strict role-based access controls within WooCommerce. 3. Conduct thorough audits of user privileges and plugin configurations to ensure no excessive permissions are granted that could be exploited. 4. Implement network-level protections such as web application firewalls (WAF) to detect and block suspicious requests targeting the plugin's endpoints. 5. Enable detailed logging and monitoring of plugin-related activities to quickly identify unauthorized access attempts or anomalous changes to wholesale pricing data. 6. Educate administrative users about the risks and encourage prompt reporting of unusual behavior. 7. Consider isolating the e-commerce environment or using segmentation to limit the blast radius in case of exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Patchstack
Date Reserved
2025-10-29T03:29:08.849Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6901d66086d093201c2b623c

Added to database: 10/29/2025, 8:54:56 AM

Last enriched: 1/20/2026, 11:58:55 PM

Last updated: 2/7/2026, 12:48:18 PM

Views: 150

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats