CVE-2025-68051

7.4 HIGH

📋 TL;DR

This CVE describes an Insecure Direct Object Reference (IDOR) vulnerability in the Shiprocket WordPress plugin that allows attackers to bypass authorization by manipulating user-controlled keys. Attackers can access or modify data belonging to other users by exploiting incorrectly configured access controls. This affects all WordPress sites running Shiprocket plugin versions up to and including 2.0.8.

💻 Affected Systems

Products:
  • Shiprocket WordPress Plugin
Versions: n/a through <= 2.0.8
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable Shiprocket plugin versions; no special configuration required for exploitation.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of user data including personal information, order details, and shipping data; potential for data exfiltration, account takeover, or unauthorized administrative actions.

🟠

Likely Case

Unauthorized access to other users' shipping information, order details, and personal data; potential for data leakage and privacy violations.

🟢

If Mitigated

Limited impact with proper access controls, logging, and monitoring in place; unauthorized access attempts would be detected and blocked.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires at least low-privilege user access; IDOR vulnerabilities are commonly exploited in real-world attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: > 2.0.8

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/shiprocket/vulnerability/wordpress-shiprocket-plugin-2-0-8-insecure-direct-object-references-idor-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel
2. Navigate to Plugins → Installed Plugins
3. Find Shiprocket plugin
4. Click 'Update Now' if update available
5. If no update available, deactivate and remove plugin
6. Install latest version from WordPress repository

🔧 Temporary Workarounds

Temporary Plugin Deactivation

all

Disable the Shiprocket plugin until patched version is available

wp plugin deactivate shiprocket

Web Application Firewall Rules

all

Implement WAF rules to detect and block IDOR attack patterns

🧯 If You Can't Patch

  • Implement strict access control checks at application layer
  • Enable detailed logging and monitoring for unauthorized access attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins → Shiprocket version

Check Version:

wp plugin list --name=shiprocket --field=version

Verify Fix Applied:

Verify Shiprocket plugin version is > 2.0.8 in WordPress admin

📡 Detection & Monitoring

Log Indicators:

  • Unusual access patterns to shipping/order endpoints
  • Requests with manipulated object IDs
  • Failed authorization attempts for user data access

Network Indicators:

  • HTTP requests with sequential or predictable object IDs
  • Unauthorized API calls to shipping endpoints

SIEM Query:

source="wordpress" AND (uri_path="/wp-json/shiprocket/*" OR uri_path="/wp-admin/admin-ajax.php") AND (status_code=200 OR status_code=403) AND user_agent!="bot"

🔗 References

📤 Share & Export