CVE-2025-66122: Missing Authorization in Design Stylish Price List
CVE-2025-66122 is a medium severity vulnerability in the Design Stylish Price List plugin, affecting versions up to 7. 2. 2. It involves missing authorization checks that allow attackers with low privileges to access or modify data beyond their intended permissions without user interaction. The vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires network access and low privileges but no user interaction. There are currently no known exploits in the wild, and no patches have been published yet. European organizations using this plugin, especially in e-commerce or pricing management, could face unauthorized data exposure or manipulation. Mitigation involves implementing strict access control policies, monitoring for unusual access patterns, and applying vendor patches once available. Countries with significant e-commerce sectors and high adoption of this plugin, such as Germany, the UK, and France, are more likely to be affected.
AI Analysis
Technical Summary
CVE-2025-66122 is a missing authorization vulnerability identified in the Design Stylish Price List plugin, affecting all versions up to and including 7.2.2. The vulnerability arises from incorrectly configured access control security levels, allowing attackers with low privileges (PR:L) to perform unauthorized actions over the network (AV:N) without requiring user interaction (UI:N). The scope of the vulnerability is unchanged (S:U), meaning the impact is limited to the affected component. The CVSS vector indicates that the vulnerability impacts confidentiality and integrity (C:L/I:L) but does not affect availability (A:N). This means an attacker can potentially read or modify sensitive pricing data or configurations that should be restricted, leading to data leakage or unauthorized changes. The vulnerability does not require elevated privileges beyond low-level access, increasing the risk of exploitation by insiders or compromised low-privilege accounts. No known exploits are currently reported in the wild, and no official patches have been released as of the publication date. The vulnerability is significant for organizations relying on the Stylish Price List plugin for pricing management or e-commerce operations, as unauthorized access could lead to competitive disadvantage or regulatory compliance issues.
Potential Impact
For European organizations, the missing authorization vulnerability could lead to unauthorized disclosure or modification of pricing data, impacting business confidentiality and data integrity. This could result in financial losses, reputational damage, and potential regulatory penalties under GDPR if personal or sensitive data is involved. E-commerce platforms and businesses using the Stylish Price List plugin may face risks of pricing manipulation, which could disrupt sales strategies or customer trust. The lack of availability impact means service disruption is unlikely, but the integrity and confidentiality breaches alone can have serious consequences. Attackers exploiting this vulnerability could gain insights into pricing strategies or alter price listings, affecting competitive positioning. The medium severity suggests a moderate but actionable risk, especially in sectors with high reliance on accurate pricing data such as retail, wholesale, and manufacturing within Europe.
Mitigation Recommendations
European organizations should immediately review access control configurations for the Stylish Price List plugin to ensure strict authorization checks are enforced. Limit plugin access to only necessary users with appropriate privilege levels and monitor logs for unusual access patterns or unauthorized changes. Implement network segmentation to restrict access to the plugin’s management interfaces. Regularly audit user permissions and remove unnecessary accounts or privileges. Stay informed about vendor updates and apply patches promptly once available. Consider deploying web application firewalls (WAFs) with rules to detect and block unauthorized access attempts targeting the plugin. Conduct internal penetration testing focusing on access control weaknesses in the plugin environment. Additionally, educate administrators and users about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of compromised low-privilege accounts.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-66122: Missing Authorization in Design Stylish Price List
Description
CVE-2025-66122 is a medium severity vulnerability in the Design Stylish Price List plugin, affecting versions up to 7. 2. 2. It involves missing authorization checks that allow attackers with low privileges to access or modify data beyond their intended permissions without user interaction. The vulnerability impacts confidentiality and integrity but does not affect availability. Exploitation requires network access and low privileges but no user interaction. There are currently no known exploits in the wild, and no patches have been published yet. European organizations using this plugin, especially in e-commerce or pricing management, could face unauthorized data exposure or manipulation. Mitigation involves implementing strict access control policies, monitoring for unusual access patterns, and applying vendor patches once available. Countries with significant e-commerce sectors and high adoption of this plugin, such as Germany, the UK, and France, are more likely to be affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-66122 is a missing authorization vulnerability identified in the Design Stylish Price List plugin, affecting all versions up to and including 7.2.2. The vulnerability arises from incorrectly configured access control security levels, allowing attackers with low privileges (PR:L) to perform unauthorized actions over the network (AV:N) without requiring user interaction (UI:N). The scope of the vulnerability is unchanged (S:U), meaning the impact is limited to the affected component. The CVSS vector indicates that the vulnerability impacts confidentiality and integrity (C:L/I:L) but does not affect availability (A:N). This means an attacker can potentially read or modify sensitive pricing data or configurations that should be restricted, leading to data leakage or unauthorized changes. The vulnerability does not require elevated privileges beyond low-level access, increasing the risk of exploitation by insiders or compromised low-privilege accounts. No known exploits are currently reported in the wild, and no official patches have been released as of the publication date. The vulnerability is significant for organizations relying on the Stylish Price List plugin for pricing management or e-commerce operations, as unauthorized access could lead to competitive disadvantage or regulatory compliance issues.
Potential Impact
For European organizations, the missing authorization vulnerability could lead to unauthorized disclosure or modification of pricing data, impacting business confidentiality and data integrity. This could result in financial losses, reputational damage, and potential regulatory penalties under GDPR if personal or sensitive data is involved. E-commerce platforms and businesses using the Stylish Price List plugin may face risks of pricing manipulation, which could disrupt sales strategies or customer trust. The lack of availability impact means service disruption is unlikely, but the integrity and confidentiality breaches alone can have serious consequences. Attackers exploiting this vulnerability could gain insights into pricing strategies or alter price listings, affecting competitive positioning. The medium severity suggests a moderate but actionable risk, especially in sectors with high reliance on accurate pricing data such as retail, wholesale, and manufacturing within Europe.
Mitigation Recommendations
European organizations should immediately review access control configurations for the Stylish Price List plugin to ensure strict authorization checks are enforced. Limit plugin access to only necessary users with appropriate privilege levels and monitor logs for unusual access patterns or unauthorized changes. Implement network segmentation to restrict access to the plugin’s management interfaces. Regularly audit user permissions and remove unnecessary accounts or privileges. Stay informed about vendor updates and apply patches promptly once available. Consider deploying web application firewalls (WAFs) with rules to detect and block unauthorized access attempts targeting the plugin. Conduct internal penetration testing focusing on access control weaknesses in the plugin environment. Additionally, educate administrators and users about the risks of privilege misuse and enforce strong authentication mechanisms to reduce the risk of compromised low-privilege accounts.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:21:26.613Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69411750594e45819d70c73d
Added to database: 12/16/2025, 8:24:48 AM
Last enriched: 2/6/2026, 8:18:01 AM
Last updated: 2/7/2026, 7:01:06 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2076: Improper Authorization in yeqifu warehouse
MediumCVE-2025-15491: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in Post Slides
HighCVE-2025-15267: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-13463: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boldthemes Bold Page Builder
MediumCVE-2025-12803: CWE-80 Improper Neutralization of Script-Related HTML Tags in a Web Page (Basic XSS) in boldthemes Bold Page Builder
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.