Description
The BigBuy Dropshipping Connector for WooCommerce plugin for WordPress is vulnerable to IP Address Spoofing in all versions up to, and including, 2.0.5 due to insufficient IP address validation and use of user-supplied HTTP headers as a primary method for IP retrieval. This makes it possible for unauthenticated attackers to retrieve the output of phpinfo().
Published: 2025-11-21
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Information Disclosure via phpinfo()
Action: Patch Now
AI Analysis

Impact

The vulnerability lies in the way the connector retrieves the client's IP address. It trusts any HTTP header value, allowing an attacker to supply a forged IP. Because the code then exposes the result of phpinfo() at the API endpoint, an unauthenticated user can trigger a request that returns the full server configuration, including environment variables, loaded modules, and database credentials if present. This is a direct information‑disclosure flaw classified as CWE‑200.

Affected Systems

All releases of the BigBuy Dropshipping Connector for WooCommerce up to and including 2.0.5 are affected. Users running this plugin on any WordPress installation – regardless of host, theme or additional plugins – are susceptible if the default configuration remains unchanged. The flaw is triggered through the plugin's API controller, which is accessible to all visitors unless explicitly restricted.

Risk and Exploitability

The CVSS base score is 5.3, indicating a moderate severity. The EPSS is below 1 %, so the likelihood of exploitation in the wild is currently considered low, and the vulnerability is not listed in CISA’s KEV catalog. Nevertheless, because the attack does not require authentication and the target endpoint is exposed to any user, a directed attacker can repeatedly request phpinfo() to harvest sensitive data. The primary vector is HTTP requests with crafted X‑Forwarded‑For or similar headers sent to the connector’s API URL.

Generated by OpenCVE AI on April 22, 2026 at 21:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the BigBuy Dropshipping Connector for WooCommerce to the latest version that validates IP addresses and removes the phpinfo() exposure.
  • If an upgrade is not immediately possible, block the API endpoint or require authentication so that only privileged users can access it.
  • Disable or remove any direct access to phpinfo() within the plugin by editing the source or configuring the web server to deny phpinfo calls.

Generated by OpenCVE AI on April 22, 2026 at 21:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 24 Nov 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Devsmip
Devsmip bigbuy Dropshipping Connector For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Devsmip
Devsmip bigbuy Dropshipping Connector For Woocommerce
Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 08:45:00 +0000

Type Values Removed Values Added
Description The BigBuy Dropshipping Connector for WooCommerce plugin for WordPress is vulnerable to IP Address Spoofing in all versions up to, and including, 2.0.5 due to insufficient IP address validation and use of user-supplied HTTP headers as a primary method for IP retrieval. This makes it possible for unauthenticated attackers to retrieve the output of phpinfo().
Title BigBuy Dropshipping Connector for WooCommerce <= 2.0.5 - Unauthenticated IP Spoofing to phpinfo() Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

Devsmip Bigbuy Dropshipping Connector For Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:37:54.339Z

Reserved: 2025-10-21T18:20:51.066Z

Link: CVE-2025-12039

cve-icon Vulnrichment

Updated: 2025-11-21T15:31:16.386Z

cve-icon NVD

Status : Deferred

Published: 2025-11-21T09:15:46.367

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12039

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T21:15:27Z

Weaknesses