CVE-2025-62091

2025-12-31 [email protected]

Lifecycle Timeline

2
Analysis Generated
Apr 01, 2026 - 17:44 vuln.today
CVE Published
Dec 31, 2025 - 15:15 nvd
N/A

Description

Missing Authorization vulnerability in Vollstart Serial Codes Generator and Validator with WooCommerce Support serial-codes-generator-and-validator allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Serial Codes Generator and Validator with WooCommerce Support: from n/a through <= 2.8.2.

Analysis

Broken access control in Vollstart Serial Codes Generator and Validator with WooCommerce Support plugin through version 2.8.2 allows unauthenticated attackers to exploit misconfigured security levels and bypass authorization checks to access or manipulate serial code functionality. The vulnerability stems from missing authorization validation on security-sensitive operations, enabling attackers to perform actions without proper privilege verification. No public exploit code or active exploitation has been identified at time of analysis, though the low EPSS score (0.05%) suggests limited real-world exploitation probability despite the access control weakness.

Technical Context

The vulnerability is a broken access control flaw (CWE-862: Missing Authorization) in a WordPress plugin that manages serial code generation, validation, and integration with WooCommerce. CWE-862 indicates that the application fails to properly verify that users have authorization to perform requested actions before executing privileged operations. The plugin is responsible for issuing and validating serial codes within WooCommerce e-commerce environments, making authorization controls critical to prevent unauthorized code generation, modification, or access to customer serial data. The root cause appears to be incorrectly configured access control security levels, suggesting that capability checks or permission validation functions are either absent or improperly implemented in the affected plugin code paths.

Affected Products

Vollstart Serial Codes Generator and Validator with WooCommerce Support plugin for WordPress, all versions through 2.8.2. The plugin is available on WordPress.org and is typically identified via plugin slug 'serial-codes-generator-and-validator'. No specific CPE string for WordPress plugins is consistently maintained in official databases; affected installations can be identified by the plugin name and version number in WordPress admin dashboards.

Remediation

Update the Serial Codes Generator and Validator with WooCommerce Support plugin to the patched version released after 2.8.2. Access the WordPress admin dashboard, navigate to Plugins, locate 'Serial Codes Generator and Validator with WooCommerce Support', and click 'Update' if available. If an update is not yet available, temporarily disable the plugin to prevent exploitation until a patched version is released by the vendor. Consult the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/serial-codes-generator-and-validator/vulnerability/wordpress-serial-codes-generator-and-validator-with-woocommerce-support-plugin-2-8-2-broken-access-control-vulnerability for confirmation of patch availability and detailed remediation guidance. Once patched, verify that user role restrictions are properly enforced by testing serial code generation and validation functions with low-privilege accounts.

Priority Score

0
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +0
POC: 0

Share

CVE-2025-62091 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy