CVE-2025-64358: Missing Authorization in WebToffee Smart Coupons for WooCommerce
Missing Authorization vulnerability in WebToffee Smart Coupons for WooCommerce wt-smart-coupons-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smart Coupons for WooCommerce: from n/a through <= 2.2.3.
AI Analysis
Technical Summary
CVE-2025-64358 identifies a Missing Authorization vulnerability in the WebToffee Smart Coupons plugin for WooCommerce, specifically affecting versions up to 2.2.3. The vulnerability arises from incorrectly configured access control mechanisms that fail to properly verify whether a user is authorized to perform certain actions related to coupon management. This flaw allows an unauthenticated attacker to exploit the plugin by interacting with the system, typically through crafted HTTP requests or URLs, to gain unauthorized access to coupon-related functionalities. The vulnerability does not require any prior privileges (PR:N) but does require user interaction (UI:R), such as clicking a malicious link. The attack vector is network-based (AV:N), meaning it can be exploited remotely over the internet. The impact is limited to confidentiality (C:L), with no direct effects on integrity or availability. This means an attacker could potentially view sensitive coupon data or information that should be restricted but cannot modify or disrupt the system. The CVSS score of 4.3 reflects a medium severity level, indicating a moderate risk. No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. The vulnerability is significant for e-commerce platforms using WooCommerce with the Smart Coupons plugin, as unauthorized access to coupon data could lead to information leakage or misuse of promotional offers.
Potential Impact
For European organizations, particularly those operating e-commerce platforms using WooCommerce with the WebToffee Smart Coupons plugin, this vulnerability poses a risk of unauthorized disclosure of coupon-related data. While the impact does not extend to data integrity or availability, unauthorized access to coupon information could facilitate fraudulent use of coupons or undermine promotional campaigns, potentially leading to financial losses and reputational damage. The confidentiality breach could also expose business-sensitive marketing strategies or customer-targeted promotions. Given the widespread use of WooCommerce in Europe, especially among small and medium-sized enterprises (SMEs), the vulnerability could affect a broad range of organizations. The lack of known exploits reduces immediate risk, but the ease of exploitation (no privileges required) means attackers could develop exploits quickly once the vulnerability is public. This threat is particularly relevant in countries with high e-commerce penetration and active online retail sectors, where coupon promotions are commonly used to drive sales.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are using the affected versions (up to 2.2.3) of the WebToffee Smart Coupons plugin. Until an official patch is released, administrators should restrict access to coupon management endpoints by implementing strict access controls, such as IP whitelisting or requiring authentication for all coupon-related operations. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting coupon functionalities. Monitoring web server logs for unusual access patterns or repeated unauthorized attempts can help identify exploitation attempts early. Organizations should also educate users about the risks of interacting with unsolicited links that could trigger the vulnerability. Once the vendor releases a patch, prompt application of updates is critical. Additionally, conducting regular security assessments and penetration tests focusing on plugin vulnerabilities can help identify and remediate similar issues proactively.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-64358: Missing Authorization in WebToffee Smart Coupons for WooCommerce
Description
Missing Authorization vulnerability in WebToffee Smart Coupons for WooCommerce wt-smart-coupons-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smart Coupons for WooCommerce: from n/a through <= 2.2.3.
AI-Powered Analysis
Technical Analysis
CVE-2025-64358 identifies a Missing Authorization vulnerability in the WebToffee Smart Coupons plugin for WooCommerce, specifically affecting versions up to 2.2.3. The vulnerability arises from incorrectly configured access control mechanisms that fail to properly verify whether a user is authorized to perform certain actions related to coupon management. This flaw allows an unauthenticated attacker to exploit the plugin by interacting with the system, typically through crafted HTTP requests or URLs, to gain unauthorized access to coupon-related functionalities. The vulnerability does not require any prior privileges (PR:N) but does require user interaction (UI:R), such as clicking a malicious link. The attack vector is network-based (AV:N), meaning it can be exploited remotely over the internet. The impact is limited to confidentiality (C:L), with no direct effects on integrity or availability. This means an attacker could potentially view sensitive coupon data or information that should be restricted but cannot modify or disrupt the system. The CVSS score of 4.3 reflects a medium severity level, indicating a moderate risk. No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. The vulnerability is significant for e-commerce platforms using WooCommerce with the Smart Coupons plugin, as unauthorized access to coupon data could lead to information leakage or misuse of promotional offers.
Potential Impact
For European organizations, particularly those operating e-commerce platforms using WooCommerce with the WebToffee Smart Coupons plugin, this vulnerability poses a risk of unauthorized disclosure of coupon-related data. While the impact does not extend to data integrity or availability, unauthorized access to coupon information could facilitate fraudulent use of coupons or undermine promotional campaigns, potentially leading to financial losses and reputational damage. The confidentiality breach could also expose business-sensitive marketing strategies or customer-targeted promotions. Given the widespread use of WooCommerce in Europe, especially among small and medium-sized enterprises (SMEs), the vulnerability could affect a broad range of organizations. The lack of known exploits reduces immediate risk, but the ease of exploitation (no privileges required) means attackers could develop exploits quickly once the vulnerability is public. This threat is particularly relevant in countries with high e-commerce penetration and active online retail sectors, where coupon promotions are commonly used to drive sales.
Mitigation Recommendations
To mitigate this vulnerability, European organizations should first verify if they are using the affected versions (up to 2.2.3) of the WebToffee Smart Coupons plugin. Until an official patch is released, administrators should restrict access to coupon management endpoints by implementing strict access controls, such as IP whitelisting or requiring authentication for all coupon-related operations. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting coupon functionalities. Monitoring web server logs for unusual access patterns or repeated unauthorized attempts can help identify exploitation attempts early. Organizations should also educate users about the risks of interacting with unsolicited links that could trigger the vulnerability. Once the vendor releases a patch, prompt application of updates is critical. Additionally, conducting regular security assessments and penetration tests focusing on plugin vulnerabilities can help identify and remediate similar issues proactively.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-10-31T11:23:06.890Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 6904a34e479ed964d8ea1e9d
Added to database: 10/31/2025, 11:53:50 AM
Last enriched: 1/21/2026, 12:03:57 AM
Last updated: 2/7/2026, 7:18:34 AM
Views: 65
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.