CVE-2025-60243

9.8 CRITICAL

📋 TL;DR

This vulnerability allows attackers to gain higher privileges than intended in the Selling Commander for WooCommerce plugin. Attackers can escalate from lower-privileged user accounts to administrative access. All WordPress sites using affected versions of this plugin are vulnerable.

💻 Affected Systems

Products:
  • Selling Commander for WooCommerce (selling-commander-connector)
Versions: All versions up to and including 1.2.46
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin activated. No special configuration required.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete site takeover where attackers gain administrative access, install backdoors, steal sensitive data, and compromise the entire WordPress installation.

🟠

Likely Case

Attackers gain administrative privileges to modify content, install malicious plugins/themes, or access sensitive customer/order data.

🟢

If Mitigated

Limited impact if strong network segmentation, regular backups, and monitoring are in place to detect and contain privilege escalation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires some level of user access to initiate privilege escalation. CVSS 9.8 indicates critical severity with low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.47 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/selling-commander-connector/vulnerability/wordpress-selling-commander-for-woocommerce-plugin-1-2-46-privilege-escalation-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Selling Commander for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download version 1.2.47+ from WordPress repository and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily deactivate the Selling Commander plugin until patched

wp plugin deactivate selling-commander-connector

Restrict user roles

all

Limit user account creation and review existing user privileges

🧯 If You Can't Patch

  • Implement strict access controls and monitor for unusual privilege changes
  • Deploy web application firewall rules to detect privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Selling Commander for WooCommerce version. If version is 1.2.46 or lower, you are vulnerable.

Check Version:

wp plugin get selling-commander-connector --field=version

Verify Fix Applied:

Verify plugin version is 1.2.47 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected user role changes in WordPress logs
  • Administrative actions from non-admin users
  • Plugin activation/deactivation from unusual accounts

Network Indicators:

  • Unusual admin panel access patterns
  • Multiple privilege escalation attempts

SIEM Query:

source="wordpress" AND (event="user_role_change" OR event="capability_granted")

🔗 References

📤 Share & Export