EUVD-2025-17540

| CVE-2025-49265 HIGH
2025-06-09 [email protected]
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None

Lifecycle Timeline

3
EUVD ID Assigned
Mar 14, 2026 - 19:21 euvd
EUVD-2025-17540
Analysis Generated
Mar 14, 2026 - 19:21 vuln.today
CVE Published
Jun 09, 2025 - 16:15 nvd
HIGH 7.5

Description

Missing Authorization vulnerability in WP Swings Membership For WooCommerce allows Accessing Functionality Not Properly Constrained by ACLs. This issue affects Membership For WooCommerce: from n/a through 2.8.1.

Analysis

Missing Authorization (CWE-862) vulnerability in WP Swings Membership For WooCommerce that allows unauthenticated attackers to access functionality not properly constrained by Access Control Lists (ACLs). The vulnerability affects versions up to and including 2.8.1 of this WordPress/WooCommerce plugin, enabling unauthorized users to bypass membership restrictions and potentially access premium features or sensitive membership data without valid credentials. With a CVSS score of 7.5 and a network-accessible attack vector requiring no privileges or user interaction, this represents a significant exposure risk for e-commerce sites relying on this plugin for membership management.

Technical Context

The vulnerability exists in WP Swings Membership For WooCommerce (CPE: likely wp:swings_membership_for_woocommerce or similar), a WordPress plugin that extends WooCommerce functionality to provide membership management and access control. The root cause is CWE-862 (Missing Authorization), which indicates that functionality intended to be restricted by role-based access control (RBAC) or similar ACL mechanisms is accessible without proper authentication/authorization checks. This class of vulnerability typically arises when developers fail to implement capability checks (in WordPress context: `current_user_can()`) or nonce verification before exposing sensitive endpoints, REST API routes, or admin functions. The plugin likely implements membership tiers and gated content, but certain administrative or data-access endpoints are missing authorization middleware, allowing unauthenticated or unprivileged users to interact with protected functionality.

Affected Products

Product: WP Swings Membership For WooCommerce; Affected Versions: All versions from n/a through 2.8.1 (inclusive); Vendor: WP Swings; Plugin Type: WordPress/WooCommerce Extension; Platform: WordPress with WooCommerce plugin installed. The vulnerability affects all installations running version 2.8.1 or earlier. Specific CPE would be: cpe:2.3:a:wpswings:membership_for_woocommerce:*:*:*:*:*:wordpress:*:* (with version constraint <=2.8.1). No specific vendor advisory URL was provided in the input, but patches should be available through WordPress plugin repository or vendor website (wpswings.com or similar).

Remediation

Immediate Actions: (1) Update WP Swings Membership For WooCommerce to version 2.8.2 or later (patch version number inferred from vulnerability affecting <=2.8.1; verify with vendor); (2) If immediate patching is not possible, disable the plugin temporarily if membership features are not critical; (3) Implement Web Application Firewall (WAF) rules to block requests to known vulnerable endpoints if identified. Long-term Mitigations: (1) Ensure all WordPress plugins are kept current with automatic updates enabled where possible; (2) Implement least-privilege WordPress user roles and capabilities; (3) Use security scanning tools (e.g., Wordfence, Sucuri) to audit for similar authorization issues; (4) Monitor access logs for suspicious unauthorized API/endpoint access attempts. Vendor Contact: Check WP Swings official website or plugin repository for patch availability and installation instructions. Apply patches immediately upon availability to all affected installations.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +38
POC: 0

Share

EUVD-2025-17540 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy