CVE-2025-13452
📋 TL;DR
This vulnerability allows unauthenticated attackers to impersonate any WordPress user and inject arbitrary messages into WooCommerce order conversations. It affects all WordPress sites using the Admin and Customer Messages After Order for WooCommerce plugin version 14 and below. Attackers can manipulate order communications without proper authorization.
💻 Affected Systems
- Admin and Customer Messages After Order for WooCommerce: OrderConvo WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could inject malicious content, impersonate administrators to issue fraudulent instructions, or disrupt business communications leading to financial loss and reputational damage.
Likely Case
Attackers inject spam, phishing links, or misleading messages into order conversations, potentially tricking customers or administrators into taking harmful actions.
If Mitigated
With proper network controls and monitoring, impact is limited to message injection without escalation to other system components.
🎯 Exploit Status
Exploitation requires direct HTTP requests to the vulnerable REST endpoint with controlled parameters. No authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Version 15 or higher
Vendor Advisory: https://plugins.trac.wordpress.org/browser/admin-and-client-message-after-order-for-woocommerce
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Admin and Customer Messages After Order for WooCommerce'. 4. Click 'Update Now' if update available. 5. If no update appears, manually download version 15+ from WordPress repository and replace plugin files.
🔧 Temporary Workarounds
Disable vulnerable REST endpoint
allRemove or restrict access to the vulnerable REST API endpoint
Add to wp-config.php: define('DISABLE_WP_REST_API', true);
Web Application Firewall rule
allBlock requests to the vulnerable endpoint
WAF rule to block: POST /wp-json/orderconvo/v1/messages
🧯 If You Can't Patch
- Disable the plugin completely until patched
- Implement strict network ACLs to restrict access to WordPress REST API endpoints
🔍 How to Verify
Check if Vulnerable:
Check plugin version in WordPress admin panel under Plugins > Installed Plugins. If version is 14 or lower, you are vulnerable.
Check Version:
wp plugin list --name='admin-and-client-message-after-order-for-woocommerce' --field=version
Verify Fix Applied:
After update, verify plugin version shows 15 or higher. Test by attempting unauthorized REST API calls to confirm they now fail.
📡 Detection & Monitoring
Log Indicators:
- Unusual POST requests to /wp-json/orderconvo/v1/messages from unauthenticated IPs
- Messages in WooCommerce orders from unexpected users or containing suspicious content
Network Indicators:
- HTTP POST requests to WordPress REST API orderconvo endpoint without authentication headers
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-json/orderconvo/v1/messages" AND http_method="POST" AND user_id="-")
🔗 References
- https://plugins.trac.wordpress.org/browser/admin-and-client-message-after-order-for-woocommerce/tags/14/includes/wprest.class.php#L113
- https://plugins.trac.wordpress.org/browser/admin-and-client-message-after-order-for-woocommerce/tags/14/includes/wprest.class.php#L56
- https://plugins.trac.wordpress.org/browser/admin-and-client-message-after-order-for-woocommerce/trunk/includes/wprest.class.php#L113
- https://plugins.trac.wordpress.org/browser/admin-and-client-message-after-order-for-woocommerce/trunk/includes/wprest.class.php#L56
- https://www.wordfence.com/threat-intel/vulnerabilities/id/2c1dd87c-cc28-43b3-8378-4583dc6de195?source=cve