Skip to main content

CVE-2025-7827: CWE-862 Missing Authorization in anzia Ni WooCommerce Customer Product Report

Medium
VulnerabilityCVE-2025-7827cvecve-2025-7827cwe-862
Published: Sat Aug 23 2025 (08/23/2025, 04:25:46 UTC)
Source: CVE Database V5
Vendor/Project: anzia
Product: Ni WooCommerce Customer Product Report

Description

The Ni WooCommerce Customer Product Report plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the ni_woocpr_action() function in all versions up to, and including, 1.2.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update plugin settings.

AI-Powered Analysis

AILast updated: 08/31/2025, 01:09:29 UTC

Technical Analysis

CVE-2025-7827 is a security vulnerability identified in the Ni WooCommerce Customer Product Report plugin for WordPress, developed by anzia. The vulnerability is classified under CWE-862, which pertains to missing authorization checks. Specifically, the issue lies in the ni_woocpr_action() function, which lacks proper capability verification. This flaw allows authenticated users with Subscriber-level access or higher to modify plugin settings without the necessary permissions. Since WordPress Subscriber roles typically have very limited privileges, this vulnerability effectively escalates their ability to alter plugin configurations, potentially leading to unauthorized changes in reporting data or plugin behavior. The vulnerability affects all versions up to and including 1.2.4 of the plugin. The CVSS v3.1 base score is 4.3, indicating a medium severity level. The vector string (AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N) shows that the attack can be executed remotely over the network with low attack complexity, requires low privileges (authenticated user), no user interaction, and impacts integrity but not confidentiality or availability. No known exploits have been reported in the wild, and no patches or updates have been linked yet. This vulnerability is significant because it undermines the principle of least privilege by allowing low-privileged users to perform unauthorized actions, potentially leading to data manipulation or disruption of business processes reliant on accurate WooCommerce reporting.

Potential Impact

For European organizations using WordPress with the Ni WooCommerce Customer Product Report plugin, this vulnerability poses a risk of unauthorized configuration changes by low-privileged users. This could lead to inaccurate sales or customer reports, impacting business decision-making, financial auditing, and compliance reporting. Although the vulnerability does not directly expose sensitive data or cause service outages, unauthorized modifications could undermine data integrity, leading to mistrust in reporting outputs. In regulated industries such as finance, retail, or healthcare, inaccurate reporting could result in compliance violations under GDPR or other data governance frameworks. Additionally, attackers could leverage this vulnerability as a foothold to escalate privileges further or to manipulate plugin behavior to facilitate other attacks. The risk is heightened in environments where multiple users have Subscriber or similar roles, such as large e-commerce operations with many registered customers or employees with limited access. Given the widespread use of WooCommerce in European e-commerce, this vulnerability could affect a broad range of businesses, from SMEs to large enterprises.

Mitigation Recommendations

1. Immediate mitigation should include restricting Subscriber-level user registrations or access until a patch is available. 2. Administrators should audit user roles and permissions to ensure that only trusted users have Subscriber or higher roles. 3. Implement a Web Application Firewall (WAF) with custom rules to monitor and block unauthorized attempts to invoke the ni_woocpr_action() function. 4. Monitor plugin settings and logs for unexpected changes indicating exploitation attempts. 5. Regularly back up plugin configurations and WooCommerce data to enable restoration in case of unauthorized modifications. 6. Engage with the plugin vendor or community to obtain or request a security patch or update that adds proper capability checks to the vulnerable function. 7. Consider temporarily disabling the Ni WooCommerce Customer Product Report plugin if the risk outweighs its utility until a fix is released. 8. Educate users with Subscriber-level access about the importance of account security and monitor for compromised accounts. 9. Employ principle of least privilege by limiting the number of users assigned Subscriber or higher roles, especially in multi-user environments.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-07-18T18:56:49.261Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68a9446fad5a09ad00269533

Added to database: 8/23/2025, 4:32:47 AM

Last enriched: 8/31/2025, 1:09:29 AM

Last updated: 9/1/2025, 1:01:35 AM

Views: 21

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats