CVE-2025-15033

6.5 MEDIUM

📋 TL;DR

A vulnerability in WooCommerce allows logged-in customers to access guest customer order data on sites with specific configurations. This affects WooCommerce versions 8.1 through 10.4.2. The issue has been fixed in WooCommerce 10.4.3 and backported to affected versions starting with 8.1.3.

💻 Affected Systems

Products:
  • WooCommerce
Versions: 8.1 to 10.4.2
Operating Systems: All
Default Config Vulnerable: ✅ No
Notes: Only affects sites with specific configurations that allow this data exposure. Does not affect WooCommerce 8.0 or earlier.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Logged-in customers could access sensitive guest customer data including names, addresses, email addresses, and potentially payment information, leading to privacy violations and potential identity theft.

🟠

Likely Case

Logged-in customers accessing limited guest order information, potentially violating privacy regulations like GDPR or CCPA.

🟢

If Mitigated

Minimal impact if proper access controls and monitoring are in place to detect unauthorized data access attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires authenticated customer access and specific site configuration. No public exploit code identified at this time.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.4.3 (or 8.1.3, 8.2.3, 8.3.3, 8.4.3, 8.5.3, 8.6.3, 8.7.3, 8.8.3, 8.9.3, 9.0.3, 9.1.3, 9.2.3, 9.3.3, 9.4.3, 10.0.3, 10.1.3, 10.2.3, 10.3.3)

Vendor Advisory: https://wpscan.com/vulnerability/f55fd7d3-7fbe-474f-9406-f47f8aee5e57/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find WooCommerce and update to version 10.4.3 or later. 4. For older versions, update to the corresponding patched version (e.g., 8.1.3 for 8.1). 5. Verify update completes successfully.

🔧 Temporary Workarounds

Disable guest checkout

all

Force all customers to create accounts before placing orders, eliminating guest order data exposure.

Restrict customer role permissions

all

Review and limit what data customer roles can access through WordPress user role management.

🧯 If You Can't Patch

  • Implement strict access logging and monitoring for customer data access patterns
  • Consider temporarily disabling customer account functionality until patching is possible

🔍 How to Verify

Check if Vulnerable:

Check WooCommerce version in WordPress admin under Plugins > Installed Plugins. If version is between 8.1 and 10.4.2 inclusive, you are vulnerable.

Check Version:

wp plugin list --name=woocommerce --field=version

Verify Fix Applied:

After updating, verify WooCommerce version shows 10.4.3 or later, or the appropriate patched version for your release line.

📡 Detection & Monitoring

Log Indicators:

  • Unusual patterns of order data access by customer accounts
  • Multiple failed attempts to access order endpoints
  • Customer accounts accessing orders not associated with their account

Network Indicators:

  • Increased API calls to order endpoints from customer accounts
  • Patterns of data exfiltration from order management endpoints

SIEM Query:

source="wordpress" AND (event="order_access" OR event="data_access") AND user_role="customer" AND result="success" | stats count by user_id, order_id

🔗 References

📤 Share & Export