Description
The Import Export For WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_setting() function in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's record setting.
Published: 2025-11-04
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized configuration change
Action: Apply Patch
AI Analysis

Impact

The Import Export For WooCommerce WordPress plugin contains a missing capability check in the update_setting() function in all releases up to 1.6.2. This flaw allows authenticated users with Subscriber-level permissions or higher to modify the plugin’s record setting, altering the way export and import operations are handled. While it does not provide direct code execution or data exfiltration, the ability to change critical configuration values can affect the reliability and behavior of an e‑commerce site, potentially disrupting order processing or data exports.

Affected Systems

The vulnerable product is the Import Export For WooCommerce plugin by sidngr. Versions through 1.6.2 are affected; the plugin is used within WordPress installations.

Risk and Exploitability

The CVSS score of 4.3 indicates a moderate severity. The EPSS score of less than 1 % suggests low exploitation probability, and the issue is not listed in the CISA KEV catalog. Attackers must be authenticated and have at least Subscriber privileges; the exploitation path is via the plugin’s settings interface accessible to those users.

Generated by OpenCVE AI on April 21, 2026 at 01:55 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of the Import Export For WooCommerce plugin (1.6.3 or later).
  • If unable to upgrade immediately, remove or downgrade Subscriber role permissions that allow access to the plugin’s settings page.
  • Review and restrict the capabilities assigned to all WordPress user roles so that only administrators can modify plugin settings.

Generated by OpenCVE AI on April 21, 2026 at 01:55 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Sidngr
Sidngr import Export For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Sidngr
Sidngr import Export For Woocommerce
Wordpress
Wordpress wordpress

Tue, 04 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Import Export For WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the update_setting() function in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugin's record setting.
Title Import Export For WooCommerce <= 1.6.2 - Missing Authorization to Authenticated (Subscriber+) Settings Update
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Sidngr Import Export For Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:13:19.058Z

Reserved: 2025-10-28T13:13:22.814Z

Link: CVE-2025-12389

cve-icon Vulnrichment

Updated: 2025-11-04T15:20:18.298Z

cve-icon NVD

Status : Deferred

Published: 2025-11-04T05:16:11.770

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12389

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:00:12Z

Weaknesses