Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-68025: Missing Authorization in Addonify Addonify Floating Cart For WooCommerce

0
High
VulnerabilityCVE-2025-68025cvecve-2025-68025
Published: Fri Feb 20 2026 (02/20/2026, 15:46:35 UTC)
Source: CVE Database V5
Vendor/Project: Addonify
Product: Addonify Floating Cart For WooCommerce

Description

CVE-2025-68025 is a missing authorization vulnerability in the Addonify Floating Cart plugin for WooCommerce, affecting versions up to 1. 2. 17. This flaw allows attackers to bypass access control mechanisms due to incorrectly configured security levels, potentially enabling unauthorized actions within the plugin. No known exploits are currently in the wild, and no CVSS score has been assigned. The vulnerability impacts the confidentiality and integrity of e-commerce operations by allowing unauthorized manipulation of cart-related functions. Mitigation requires applying patches once available or implementing strict access control policies and monitoring for suspicious activity. Organizations using WooCommerce with this plugin, especially in countries with high e-commerce adoption, are at risk. The severity is assessed as high given the potential for unauthorized access without authentication. Defenders should prioritize verifying plugin versions, restricting administrative access, and monitoring logs for anomalous behavior related to the floating cart functionality.

AI-Powered Analysis

AILast updated: 02/20/2026, 21:18:36 UTC

Technical Analysis

CVE-2025-68025 identifies a missing authorization vulnerability in the Addonify Floating Cart plugin for WooCommerce, specifically in versions up to and including 1.2.17. The vulnerability arises from improperly configured access control security levels within the plugin, which allows attackers to bypass authorization checks. This means that unauthorized users could potentially perform actions that should be restricted, such as manipulating cart contents or triggering cart-related processes without proper permissions. The plugin is widely used to enhance the shopping cart experience on WooCommerce-powered e-commerce sites. The lack of a CVSS score indicates that the vulnerability has not yet been fully evaluated for severity, but the nature of missing authorization typically implies a significant risk. No known exploits have been reported in the wild, suggesting that active exploitation is not yet observed. The vulnerability was reserved in December 2025 and published in February 2026. The absence of patch links indicates that a fix may not yet be publicly available, emphasizing the need for immediate attention from site administrators. The flaw impacts the integrity and confidentiality of e-commerce transactions by potentially allowing unauthorized manipulation of cart data or processes. Given WooCommerce's extensive market penetration globally, this vulnerability could affect a broad range of organizations, especially those relying on the Addonify Floating Cart plugin for enhanced user experience.

Potential Impact

The missing authorization vulnerability can lead to unauthorized users performing actions within the Addonify Floating Cart plugin that should be restricted, potentially allowing manipulation of shopping cart contents or other cart-related operations. This can undermine the integrity of e-commerce transactions, leading to fraudulent orders, unauthorized discounts, or disruption of the purchase process. Confidentiality could also be impacted if sensitive user or order data is exposed or altered. Availability impact is likely limited but could occur if attackers exploit the flaw to disrupt cart functionality, causing denial of service to legitimate users. Organizations worldwide that use WooCommerce with this plugin are at risk, particularly those with high transaction volumes or sensitive customer data. The lack of authentication requirements for exploitation increases the threat level, making it easier for attackers to leverage this vulnerability remotely. The absence of known exploits currently reduces immediate risk but does not eliminate the potential for future attacks once exploit code becomes available. Overall, the vulnerability poses a high risk to the security and trustworthiness of e-commerce platforms using the affected plugin.

Mitigation Recommendations

1. Monitor official Addonify and WooCommerce channels for security patches addressing CVE-2025-68025 and apply them immediately upon release. 2. Until a patch is available, restrict access to the WordPress admin dashboard and plugin settings to trusted personnel only, using strong authentication methods such as multi-factor authentication (MFA). 3. Implement web application firewalls (WAF) with custom rules to detect and block unauthorized attempts to access or manipulate the floating cart functionality. 4. Conduct regular security audits and review access logs for unusual activity related to the Addonify Floating Cart plugin endpoints. 5. Consider temporarily disabling or replacing the Addonify Floating Cart plugin with alternative solutions that do not have this vulnerability if patching is delayed. 6. Harden the overall WooCommerce environment by limiting plugin installations to only those that are essential and well-maintained. 7. Educate site administrators and developers about the risks of missing authorization vulnerabilities and the importance of secure access control configurations. 8. Use security plugins that can detect and alert on privilege escalation or unauthorized access attempts within WordPress environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-12-15T10:00:59.034Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6998c9edbe58cf853bab8528

Added to database: 2/20/2026, 8:54:05 PM

Last enriched: 2/20/2026, 9:18:36 PM

Last updated: 2/21/2026, 5:46:38 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats