CVE-2025-64382

4.3 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the WebToffee Order Export & Order Import for WooCommerce plugin that allows attackers to exploit incorrectly configured access control security levels. It affects WordPress sites using this plugin, potentially allowing unauthorized users to access or manipulate order import/export functionality. All users of the plugin versions up to and including 2.6.7 are affected.

💻 Affected Systems

Products:
  • WebToffee Order Export & Order Import for WooCommerce
Versions: n/a through <= 2.6.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin version. Requires WooCommerce to be installed and active.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could access, modify, or export sensitive order data including customer information, payment details, and order history, potentially leading to data theft, fraud, or business disruption.

🟠

Likely Case

Unauthorized users accessing order data they shouldn't have permission to view, potentially exposing customer PII and order details.

🟢

If Mitigated

Limited impact if proper WordPress user role permissions and network segmentation are in place, though the vulnerability still exists at the plugin level.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access to the WordPress site but bypasses intended authorization controls. The vulnerability is in access control logic rather than requiring complex technical exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 2.6.8 or later

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/order-import-export-for-woocommerce/vulnerability/wordpress-order-export-order-import-for-woocommerce-plugin-2-6-7-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins > Installed Plugins. 3. Find 'Order Export & Order Import for WooCommerce'. 4. Click 'Update Now' if available. 5. Alternatively, download version 2.6.8+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched

wp plugin deactivate order-import-export-for-woocommerce

Restrict plugin access via .htaccess

linux

Add access restrictions to plugin directory

# Add to .htaccess in plugin directory:
Order Deny,Allow
Deny from all
Allow from 127.0.0.1

🧯 If You Can't Patch

  • Implement strict WordPress user role management and audit all user permissions
  • Add web application firewall rules to block suspicious access patterns to order import/export endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel > Plugins > Order Export & Order Import for WooCommerce > Version. If version is 2.6.7 or lower, you are vulnerable.

Check Version:

wp plugin get order-import-export-for-woocommerce --field=version

Verify Fix Applied:

Verify plugin version is 2.6.8 or higher in WordPress admin panel. Test order import/export functionality with non-admin users to ensure proper access controls.

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized access attempts to /wp-content/plugins/order-import-export-for-woocommerce/ endpoints
  • Order export/import activities from non-admin user accounts
  • 403 errors followed by successful 200 responses to plugin endpoints

Network Indicators:

  • HTTP requests to order import/export endpoints from unauthorized IPs or user agents
  • Unusual patterns of data export requests

SIEM Query:

source="wordpress.log" AND ("order-import-export" OR "WebToffee") AND (response=200 OR response=403) AND user_role!="administrator"

🔗 References

📤 Share & Export