Home

Description

The wModes – Catalog Mode, Product Pricing, Enquiry Forms & Promotions plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 1.2.2. This is due to the plugin not properly verifying that a user is authorized to access sensitive information via the AJAX endpoint. This makes it possible for authenticated attackers, with subscriber-level access and above, to extract sensitive information including user emails, usernames, roles, capabilities, and WooCommerce data such as products and payment methods.

PUBLISHED Reserved 2025-11-03 | Published 2025-11-18 | Updated 2025-11-18 | Assigner Wordfence




MEDIUM: 4.3CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-11-17:Disclosed

Credits

NumeX finder

References

www.wordfence.com/...-45dd-4168-8749-c8eebe237b60?source=cve

plugins.trac.wordpress.org/.../core/class.reon.core.ajax.php

plugins.trac.wordpress.org/.../core/class.reon.core.ajax.php

plugins.trac.wordpress.org/.../core/class.reon.core.ajax.php

plugins.trac.wordpress.org/...quiry-forms-promotions%2Ftrunk

cve.org (CVE-2025-12639)

nvd.nist.gov (CVE-2025-12639)

Download JSON