Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64382: Missing Authorization in WebToffee Order Export & Order Import for WooCommerce

0
Medium
VulnerabilityCVE-2025-64382cvecve-2025-64382
Published: Thu Nov 13 2025 (11/13/2025, 09:24:35 UTC)
Source: CVE Database V5
Vendor/Project: WebToffee
Product: Order Export & Order Import for WooCommerce

Description

Missing Authorization vulnerability in WebToffee Order Export & Order Import for WooCommerce order-import-export-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Order Export & Order Import for WooCommerce: from n/a through <= 2.6.7.

AI-Powered Analysis

AILast updated: 11/20/2025, 10:25:08 UTC

Technical Analysis

CVE-2025-64382 identifies a missing authorization vulnerability in the WebToffee Order Export & Order Import plugin for WooCommerce, specifically in versions up to 2.6.7. The vulnerability arises from incorrectly configured access control mechanisms that fail to properly verify whether a user has the necessary permissions to perform order export or import operations. This flaw allows users with low-level privileges (PR:L) to access sensitive order data by exploiting the lack of authorization checks, potentially leading to unauthorized data exposure. The attack vector is network-based (AV:N), requiring no user interaction (UI:N), and the scope remains unchanged (S:U). The CVSS v3.1 base score is 4.3, reflecting a medium severity primarily due to the confidentiality impact (C:L) without affecting integrity or availability. Although no known exploits have been reported in the wild, the vulnerability poses a risk to e-commerce platforms relying on this plugin for order management. The plugin is widely used in WooCommerce environments, which are popular in European e-commerce markets. The vulnerability could be leveraged to extract order details such as customer information, order contents, and transaction data, potentially facilitating further attacks like phishing or fraud. The absence of a patch link indicates that a fix may not yet be publicly available, emphasizing the need for interim mitigations.

Potential Impact

For European organizations, especially e-commerce businesses using WooCommerce with the WebToffee Order Export & Order Import plugin, this vulnerability could lead to unauthorized disclosure of sensitive customer and order data. Such data exposure can damage customer trust, violate data protection regulations like GDPR, and lead to financial and reputational losses. Since the vulnerability does not affect data integrity or availability, the primary concern is confidentiality. However, exposed order data could be used for targeted phishing or social engineering attacks against customers or the organization. The medium severity score suggests a moderate risk, but the widespread use of WooCommerce in Europe increases the potential impact. Organizations in sectors with high transaction volumes or sensitive customer data are particularly at risk. Additionally, failure to address this vulnerability could result in regulatory penalties under GDPR for inadequate access controls on personal data.

Mitigation Recommendations

1. Monitor WebToffee and WooCommerce plugin repositories for official patches addressing CVE-2025-64382 and apply updates promptly once available. 2. Restrict access to the Order Export & Order Import plugin functionality to trusted administrative users only, using role-based access controls within WooCommerce and WordPress. 3. Implement network-level restrictions such as IP whitelisting or VPN access for administrative interfaces to reduce exposure. 4. Audit and monitor logs for unusual order export or import activities to detect potential exploitation attempts early. 5. Consider disabling the export/import functionality temporarily if it is not critical to business operations until a patch is released. 6. Educate staff about the risks of unauthorized data access and enforce strong authentication mechanisms for administrative accounts. 7. Review and harden WordPress and WooCommerce security configurations to minimize privilege escalation risks that could compound this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-31T11:25:32.711Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6915aa34dac9b42fc37a58f5

Added to database: 11/13/2025, 9:51:48 AM

Last enriched: 11/20/2025, 10:25:08 AM

Last updated: 12/29/2025, 4:27:14 AM

Views: 133

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats