Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-7827: CWE-862 Missing Authorization in anzia Ni WooCommerce Customer Product Report

0
Medium
VulnerabilityCVE-2025-7827cvecve-2025-7827cwe-862
Published: Sat Aug 23 2025 (08/23/2025, 04:25:46 UTC)
Source: CVE Database V5
Vendor/Project: anzia
Product: Ni WooCommerce Customer Product Report

Description

The Ni WooCommerce Customer Product Report plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ni_woocpr_action() function in all versions up to, and including, 1.2.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update plugin settings.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 16:40:00 UTC

Technical Analysis

CVE-2025-7827 identifies a missing authorization vulnerability (CWE-862) in the Ni WooCommerce Customer Product Report plugin for WordPress. The vulnerability exists in the ni_woocpr_action() function, which lacks proper capability checks before allowing modification of plugin settings. This flaw affects all versions up to and including 1.2.4. An attacker with authenticated access at the Subscriber role or higher can exploit this to update plugin configurations without appropriate permissions. The vulnerability does not require user interaction beyond authentication and has a low attack complexity. The CVSS v3.1 score is 4.3, indicating a medium severity primarily due to unauthorized integrity modification without confidentiality or availability impact. No patches or known exploits are currently available or reported. The vulnerability could be leveraged to alter plugin behavior, potentially affecting reporting accuracy or enabling further attacks if combined with other vulnerabilities. The root cause is the absence of a capability check in the plugin’s action handler, violating the principle of least privilege in WordPress plugin development.

Potential Impact

The primary impact of CVE-2025-7827 is unauthorized modification of plugin settings, which compromises the integrity of the Ni WooCommerce Customer Product Report plugin’s configuration. While it does not directly expose sensitive data or cause denial of service, altered settings could lead to inaccurate reporting or unintended plugin behavior, potentially misleading administrators or affecting business decisions. Attackers with Subscriber-level access, which is a low-privilege role, can exploit this, increasing the risk from compromised or malicious low-level accounts. This vulnerability could serve as a foothold for further attacks if combined with other vulnerabilities or misconfigurations. Organizations relying on this plugin for e-commerce analytics or customer reporting may face operational disruptions or data integrity issues. The lack of known exploits reduces immediate risk, but the ease of exploitation and widespread use of WordPress and WooCommerce elevate the threat potential globally.

Mitigation Recommendations

To mitigate CVE-2025-7827, organizations should immediately audit user roles and permissions to ensure that only trusted users have Subscriber-level or higher access. Implement strict role-based access controls and consider restricting plugin management capabilities to Administrator roles only. Monitor and log changes to plugin settings to detect unauthorized modifications promptly. Since no official patch is currently available, consider temporarily disabling the Ni WooCommerce Customer Product Report plugin if feasible or replacing it with alternative reporting tools that enforce proper authorization. Developers and site administrators should review the plugin’s source code to add explicit capability checks in the ni_woocpr_action() function, ensuring only authorized roles can modify settings. Regularly update WordPress and plugins to the latest versions once patches are released. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious requests targeting the vulnerable function.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-18T18:56:49.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a9446fad5a09ad00269533

Added to database: 8/23/2025, 4:32:47 AM

Last enriched: 2/26/2026, 4:40:00 PM

Last updated: 3/25/2026, 12:32:03 AM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses