Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-67580: Missing Authorization in Constant Contact Constant Contact + WooCommerce

0
Medium
VulnerabilityCVE-2025-67580cvecve-2025-67580
Published: Tue Dec 09 2025 (12/09/2025, 14:14:15 UTC)
Source: CVE Database V5
Vendor/Project: Constant Contact
Product: Constant Contact + WooCommerce

Description

Missing Authorization vulnerability in Constant Contact Constant Contact + WooCommerce constant-contact-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Constant Contact + WooCommerce: from n/a through <= 2.4.1.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/12/2026, 06:58:28 UTC

Technical Analysis

CVE-2025-67580 is a security vulnerability identified in the Constant Contact + WooCommerce plugin, specifically versions up to 2.4.1. The root cause is a missing authorization mechanism, meaning that certain functions or data within the plugin can be accessed without proper permission checks. This type of vulnerability arises when access control security levels are incorrectly configured, allowing attackers to bypass restrictions that should prevent unauthorized access. The vulnerability is exploitable remotely over the network without requiring any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is limited to confidentiality, suggesting that sensitive information could be exposed but the integrity and availability of the system remain unaffected. Although no public exploits have been reported, the ease of exploitation and the plugin's widespread use in e-commerce environments make this a notable risk. Constant Contact + WooCommerce integrates email marketing with WooCommerce stores, so unauthorized access could lead to exposure of customer contact data or marketing lists. The vulnerability was published on December 9, 2025, and no patches or fixes have been linked yet, emphasizing the need for vigilance and proactive mitigation by affected organizations.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to the confidentiality of customer data managed through the Constant Contact + WooCommerce plugin. Exposure of contact lists or marketing data could lead to privacy violations under GDPR, resulting in regulatory penalties and reputational damage. E-commerce businesses relying on WooCommerce and Constant Contact integrations may face targeted exploitation attempts, especially those with large customer bases. While the vulnerability does not affect data integrity or system availability, unauthorized data disclosure can facilitate phishing campaigns, social engineering, or further attacks. The impact is heightened in sectors with strict data protection requirements such as finance, healthcare, and retail. Organizations operating in Europe must consider the legal and compliance implications of any data leakage. Additionally, the absence of authentication requirements lowers the barrier for attackers, increasing the likelihood of exploitation if unpatched.

Mitigation Recommendations

1. Monitor official Constant Contact and WooCommerce channels for patches addressing CVE-2025-67580 and apply updates promptly once available. 2. Until patches are released, restrict access to the plugin’s administrative and API endpoints using network-level controls such as IP whitelisting or web application firewalls (WAFs). 3. Implement strict role-based access controls within WordPress to limit who can interact with the plugin’s features. 4. Conduct regular audits of plugin configurations and access logs to detect unauthorized access attempts. 5. Employ security plugins that can detect and block suspicious activities related to WooCommerce and Constant Contact integrations. 6. Educate staff about the risks of unauthorized data exposure and ensure secure handling of customer data. 7. Consider temporarily disabling the plugin if it is not critical to operations until a fix is available. 8. Review and enhance overall e-commerce platform security posture, including multi-factor authentication and secure coding practices.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-09T12:21:34.120Z
Cvss Version
null
State
PUBLISHED

Threat ID: 693833ad29cea75c35ae570b

Added to database: 12/9/2025, 2:35:25 PM

Last enriched: 2/12/2026, 6:58:28 AM

Last updated: 3/25/2026, 9:06:46 PM

Views: 57

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses