CVE-2025-64379
📋 TL;DR
This CVE describes a missing authorization vulnerability in the Pluggabl Booster for WooCommerce plugin that allows attackers to exploit incorrectly configured access control security levels. The vulnerability affects WooCommerce sites using the Booster plugin, potentially allowing unauthorized users to access restricted functionality. All sites running affected versions of the plugin are at risk.
💻 Affected Systems
- Pluggabl Booster for WooCommerce (woocommerce-jetpack)
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Attackers could modify WooCommerce settings, access sensitive order data, or manipulate plugin functionality to disrupt e-commerce operations.
Likely Case
Unauthorized users could view or modify plugin settings, potentially affecting store configuration or accessing limited administrative functions.
If Mitigated
With proper access controls and network segmentation, impact would be limited to the plugin's scope without compromising the entire WordPress/WooCommerce installation.
🎯 Exploit Status
Exploitation requires some level of access to the WordPress site, but specific authorization checks are missing for certain plugin functions.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 7.4.1 or later
Restart Required: No
Instructions:
1. Log into WordPress admin panel
2. Navigate to Plugins > Installed Plugins
3. Find 'Booster for WooCommerce'
4. Click 'Update Now' if available
5. Alternatively, download version 7.4.1+ from WordPress.org and manually update
🔧 Temporary Workarounds
Temporary Plugin Deactivation
allDisable the vulnerable plugin until patched
wp plugin deactivate woocommerce-jetpack
Access Restriction via .htaccess
linuxRestrict access to plugin directories
# Add to .htaccess in wp-content/plugins/woocommerce-jetpack/
Order Deny,Allow
Deny from all
🧯 If You Can't Patch
- Implement strict network access controls to limit who can access the WordPress admin interface
- Enable WordPress security plugins that monitor for unauthorized access attempts and implement additional authorization layers
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin > Plugins > Installed Plugins for 'Booster for WooCommerce' version 7.4.0 or earlier
Check Version:
wp plugin get woocommerce-jetpack --field=version
Verify Fix Applied:
Verify plugin version shows 7.4.1 or higher in WordPress admin panel
📡 Detection & Monitoring
Log Indicators:
- Unauthorized access attempts to plugin-specific admin pages
- Unusual plugin setting changes from non-admin users
Network Indicators:
- HTTP requests to /wp-admin/admin.php?page=wcj-* endpoints from unauthorized IPs
SIEM Query:
source="wordpress.log" AND (uri_path="/wp-admin/admin.php" AND query="page=wcj-*") AND user_role!="administrator"