Home

Description

A vulnerability in WooCommerce 8.1 to 10.4.2 can allow logged-in customers to access order data of guest customers on sites with a certain configuration. This has been fixed in WooCommerce 10.4.3, as well as all the previously affected versions through point releases, starting from 8.1, where it has been fixed in 8.1.3. It does not affect WooCommerce 8.0 or earlier.

PUBLISHED Reserved 2025-12-22 | Published 2025-12-22 | Updated 2025-12-22 | Assigner WPScan

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

8.1.0 (semver) before 8.1.3
affected

8.2.0 (semver) before 8.2.4
affected

8.3.0 (semver) before 8.3.3
affected

8.4.0 (semver) before 8.4.2
affected

8.5.0 (semver) before 8.5.4
affected

8.6.0 (semver) before 8.6.3
affected

8.7.0 (semver) before 8.7.2
affected

8.8.0 (semver) before 8.8.6
affected

8.9.0 (semver) before 8.9.4
affected

9.0.0 (semver) before 9.0.3
affected

9.1.0 (semver) before 9.1.5
affected

9.2.0 (semver) before 9.2.4
affected

9.3.0 (semver) before 9.3.5
affected

9.4.0 (semver) before 9.4.4
affected

9.5.0 (semver) before 9.5.3
affected

9.6.0 (semver) before 9.6.3
affected

9.7.0 (semver) before 9.7.2
affected

9.8.0 (semver) before 9.8.6
affected

9.9.0 (semver) before 9.9.6
affected

10.0.0 (semver) before 10.0.5
affected

10.1.0 (semver) before 10.1.3
affected

10.2.0 (semver) before 10.2.3
affected

10.3.0 (semver) before 10.3.7
affected

10.4.0 (semver) before 10.4.3
affected

Credits

Peter Stöckli finder

WPScan coordinator

References

wpscan.com/...rability/f55fd7d3-7fbe-474f-9406-f47f8aee5e57/ exploit vdb-entry technical-description

cve.org (CVE-2025-15033)

nvd.nist.gov (CVE-2025-15033)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.