Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64358: Missing Authorization in WebToffee Smart Coupons for WooCommerce

0
Medium
VulnerabilityCVE-2025-64358cvecve-2025-64358
Published: Fri Oct 31 2025 (10/31/2025, 11:42:28 UTC)
Source: CVE Database V5
Vendor/Project: WebToffee
Product: Smart Coupons for WooCommerce

Description

Missing Authorization vulnerability in WebToffee Smart Coupons for WooCommerce wt-smart-coupons-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Smart Coupons for WooCommerce: from n/a through <= 2.2.3.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:03:57 UTC

Technical Analysis

CVE-2025-64358 identifies a Missing Authorization vulnerability in the WebToffee Smart Coupons plugin for WooCommerce, specifically affecting versions up to 2.2.3. The vulnerability arises from incorrectly configured access control mechanisms that fail to properly verify whether a user is authorized to perform certain actions related to coupon management. This flaw allows an unauthenticated attacker to exploit the plugin by interacting with the system, typically through crafted HTTP requests or URLs, to gain unauthorized access to coupon-related functionalities. The vulnerability does not require any prior privileges (PR:N) but does require user interaction (UI:R), such as clicking a malicious link. The attack vector is network-based (AV:N), meaning it can be exploited remotely over the internet. The impact is limited to confidentiality (C:L), with no direct effects on integrity or availability. This means an attacker could potentially view sensitive coupon data or information that should be restricted but cannot modify or disrupt the system. The CVSS score of 4.3 reflects a medium severity level, indicating a moderate risk. No known exploits have been reported in the wild, and no official patches have been published at the time of disclosure. The vulnerability is significant for e-commerce platforms using WooCommerce with the Smart Coupons plugin, as unauthorized access to coupon data could lead to information leakage or misuse of promotional offers.

Potential Impact

For European organizations, particularly those operating e-commerce platforms using WooCommerce with the WebToffee Smart Coupons plugin, this vulnerability poses a risk of unauthorized disclosure of coupon-related data. While the impact does not extend to data integrity or availability, unauthorized access to coupon information could facilitate fraudulent use of coupons or undermine promotional campaigns, potentially leading to financial losses and reputational damage. The confidentiality breach could also expose business-sensitive marketing strategies or customer-targeted promotions. Given the widespread use of WooCommerce in Europe, especially among small and medium-sized enterprises (SMEs), the vulnerability could affect a broad range of organizations. The lack of known exploits reduces immediate risk, but the ease of exploitation (no privileges required) means attackers could develop exploits quickly once the vulnerability is public. This threat is particularly relevant in countries with high e-commerce penetration and active online retail sectors, where coupon promotions are commonly used to drive sales.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should first verify if they are using the affected versions (up to 2.2.3) of the WebToffee Smart Coupons plugin. Until an official patch is released, administrators should restrict access to coupon management endpoints by implementing strict access controls, such as IP whitelisting or requiring authentication for all coupon-related operations. Web application firewalls (WAFs) can be configured to detect and block suspicious requests targeting coupon functionalities. Monitoring web server logs for unusual access patterns or repeated unauthorized attempts can help identify exploitation attempts early. Organizations should also educate users about the risks of interacting with unsolicited links that could trigger the vulnerability. Once the vendor releases a patch, prompt application of updates is critical. Additionally, conducting regular security assessments and penetration tests focusing on plugin vulnerabilities can help identify and remediate similar issues proactively.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-31T11:23:06.890Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6904a34e479ed964d8ea1e9d

Added to database: 10/31/2025, 11:53:50 AM

Last enriched: 1/21/2026, 12:03:57 AM

Last updated: 2/7/2026, 7:18:34 AM

Views: 65

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats