CVE-2025-67589: Missing Authorization in WP Overnight WooCommerce PDF Invoices & Packing Slips
Missing Authorization vulnerability in WP Overnight WooCommerce PDF Invoices & Packing Slips woocommerce-pdf-invoices-packing-slips allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WooCommerce PDF Invoices & Packing Slips: from n/a through <= 4.9.1.
AI Analysis
Technical Summary
CVE-2025-67589 identifies a missing authorization vulnerability in the WP Overnight WooCommerce PDF Invoices & Packing Slips plugin, affecting versions up to and including 4.9.1. The vulnerability arises from incorrectly configured access control mechanisms, allowing authenticated users with limited privileges (PR:L) to bypass authorization checks and access invoice and packing slip data they should not be permitted to view or manipulate. The vulnerability is remotely exploitable over the network (AV:N) without requiring user interaction (UI:N). The CVSS 3.1 base score is 4.3 (medium), reflecting a low confidentiality impact and no impact on integrity or availability. This suggests that while unauthorized data disclosure is possible, it does not allow modification or disruption of services. The plugin is widely used in WooCommerce-based e-commerce sites to generate and manage PDF invoices and packing slips, which contain sensitive customer and order information. The lack of proper authorization checks could expose sensitive business and customer data to unauthorized internal users or attackers who have gained limited access. No known exploits are currently reported in the wild, and no official patches have been linked, indicating that organizations must proactively monitor for updates and consider interim controls. The vulnerability was published on December 9, 2025, by Patchstack, with no CWE assigned yet. Given the nature of the flaw, it is primarily a privilege escalation or access control bypass issue within the plugin's functionality.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive customer and order information contained in PDF invoices and packing slips generated by WooCommerce stores using the affected plugin. This could lead to privacy violations under GDPR if personal data is exposed without consent. Although the vulnerability does not allow data modification or service disruption, unauthorized access to financial documents could facilitate fraud, social engineering, or competitive intelligence gathering. E-commerce businesses relying on WooCommerce in Europe, especially those handling large volumes of transactions, are at risk of reputational damage and regulatory penalties if exploited. The medium severity rating reflects that the impact is limited to confidentiality and requires some level of authenticated access, reducing the likelihood of widespread exploitation. However, insider threats or compromised low-privilege accounts could leverage this flaw to escalate access. The absence of known exploits provides a window for mitigation, but organizations should act promptly to avoid exposure.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify if the WP Overnight PDF Invoices & Packing Slips plugin is in use and confirm the version. Until an official patch is released, restrict access to the plugin’s invoice and packing slip functionalities to only trusted and necessary user roles, minimizing the number of users with any level of privilege that could exploit this flaw. Implement strict role-based access controls (RBAC) and review user permissions regularly. Monitor access logs for unusual or unauthorized attempts to access invoice or packing slip data. Consider disabling the plugin temporarily if feasible or replacing it with alternative solutions that have verified secure access controls. Stay informed through vendor advisories and Patchstack updates to apply patches promptly once available. Additionally, conduct internal security awareness training to reduce the risk of credential compromise that could facilitate exploitation. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin endpoints. Finally, ensure that all WooCommerce and WordPress core components are kept up to date to reduce the attack surface.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-67589: Missing Authorization in WP Overnight WooCommerce PDF Invoices & Packing Slips
Description
Missing Authorization vulnerability in WP Overnight WooCommerce PDF Invoices & Packing Slips woocommerce-pdf-invoices-packing-slips allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WooCommerce PDF Invoices & Packing Slips: from n/a through <= 4.9.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-67589 identifies a missing authorization vulnerability in the WP Overnight WooCommerce PDF Invoices & Packing Slips plugin, affecting versions up to and including 4.9.1. The vulnerability arises from incorrectly configured access control mechanisms, allowing authenticated users with limited privileges (PR:L) to bypass authorization checks and access invoice and packing slip data they should not be permitted to view or manipulate. The vulnerability is remotely exploitable over the network (AV:N) without requiring user interaction (UI:N). The CVSS 3.1 base score is 4.3 (medium), reflecting a low confidentiality impact and no impact on integrity or availability. This suggests that while unauthorized data disclosure is possible, it does not allow modification or disruption of services. The plugin is widely used in WooCommerce-based e-commerce sites to generate and manage PDF invoices and packing slips, which contain sensitive customer and order information. The lack of proper authorization checks could expose sensitive business and customer data to unauthorized internal users or attackers who have gained limited access. No known exploits are currently reported in the wild, and no official patches have been linked, indicating that organizations must proactively monitor for updates and consider interim controls. The vulnerability was published on December 9, 2025, by Patchstack, with no CWE assigned yet. Given the nature of the flaw, it is primarily a privilege escalation or access control bypass issue within the plugin's functionality.
Potential Impact
For European organizations, this vulnerability poses a risk of unauthorized disclosure of sensitive customer and order information contained in PDF invoices and packing slips generated by WooCommerce stores using the affected plugin. This could lead to privacy violations under GDPR if personal data is exposed without consent. Although the vulnerability does not allow data modification or service disruption, unauthorized access to financial documents could facilitate fraud, social engineering, or competitive intelligence gathering. E-commerce businesses relying on WooCommerce in Europe, especially those handling large volumes of transactions, are at risk of reputational damage and regulatory penalties if exploited. The medium severity rating reflects that the impact is limited to confidentiality and requires some level of authenticated access, reducing the likelihood of widespread exploitation. However, insider threats or compromised low-privilege accounts could leverage this flaw to escalate access. The absence of known exploits provides a window for mitigation, but organizations should act promptly to avoid exposure.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify if the WP Overnight PDF Invoices & Packing Slips plugin is in use and confirm the version. Until an official patch is released, restrict access to the plugin’s invoice and packing slip functionalities to only trusted and necessary user roles, minimizing the number of users with any level of privilege that could exploit this flaw. Implement strict role-based access controls (RBAC) and review user permissions regularly. Monitor access logs for unusual or unauthorized attempts to access invoice or packing slip data. Consider disabling the plugin temporarily if feasible or replacing it with alternative solutions that have verified secure access controls. Stay informed through vendor advisories and Patchstack updates to apply patches promptly once available. Additionally, conduct internal security awareness training to reduce the risk of credential compromise that could facilitate exploitation. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the plugin endpoints. Finally, ensure that all WooCommerce and WordPress core components are kept up to date to reduce the attack surface.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-12-09T12:21:39.681Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 693833ae29cea75c35ae5764
Added to database: 12/9/2025, 2:35:26 PM
Last enriched: 1/21/2026, 1:05:46 AM
Last updated: 2/7/2026, 9:15:46 PM
Views: 79
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2113: Deserialization in yuan1994 tpadmin
MediumCVE-2026-2111: Path Traversal in JeecgBoot
MediumCVE-2026-2110: Improper Restriction of Excessive Authentication Attempts in Tasin1025 SwiftBuy
MediumCVE-2026-2109: Improper Authorization in jsbroks COCO Annotator
MediumCVE-2026-2108: Denial of Service in jsbroks COCO Annotator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.