Home

Description

The OneClick Chat to Order plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.8 via the 'wa_order_thank_you_override' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view sensitive customer information including names, email addresses, phone numbers, billing/shipping addresses, order contents, and payment methods by simply changing the order ID in the URL.

PUBLISHED Reserved 2025-11-21 | Published 2025-11-22 | Updated 2025-11-22 | Assigner Wordfence




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Problem types

CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-11-21:Disclosed

Credits

Md Shofiur Rahman finder

References

www.wordfence.com/...-044e-49ba-9bec-4f80b41b8ea2?source=cve

plugins.trac.wordpress.org/...buttons/wa-order-thank-you.php

plugins.trac.wordpress.org/changeset/3391625/

cve.org (CVE-2025-13526)

nvd.nist.gov (CVE-2025-13526)

Download JSON