Description
The Dokan Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `/dokan/v1/wholesale/register` REST API endpoint in all versions up to, and including, 4.1.3. This makes it possible for unauthenticated attackers to enumerate users and retrieve their email addresses via the REST API by providing a user ID, along with other information such as usernames, display names, user roles, and registration dates.
Published: 2025-12-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated Sensitive Information Exposure
Action: Patch
AI Analysis

Impact

The Dokan Pro plugin for WordPress allows unauthenticated attackers to access the REST API endpoint /dokan/v1/wholesale/register without a capability check, enabling enumeration of users and retrieval of private data such as email addresses, usernames, display names, roles, and registration dates. This flaw permits a threat actor to collect user information without needing to log in, potentially facilitating phishing, credential stuffing, or privacy breaches. The key weakness is an access control issue, classified as CWE-862.

Affected Systems

All installations of the Wedevs Dokan Pro plugin for WordPress up to and including version 4.1.3 are affected. The vulnerability is present in every release through 4.1.3 and is fixed in later versions; users of these plugins should verify the version number against the changelog.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests a very low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog. The most likely attack vector is an unauthenticated HTTP request to the vulnerable REST endpoint. An attacker can simply craft a GET or POST request that supplies a user ID, and the plugin will return the corresponding data without any authentication, making exploitation straightforward for online threat actor.

Generated by OpenCVE AI on April 22, 2026 at 00:10 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Dokan Pro plugin to version 4.1.4 or later where the vulnerability is fixed.
  • Configure a web application firewall rule or plugin setting that blocks unauthenticated requests to the /dokan/v1/wholesale/register endpoint.
  • After upgrading, review user data that may have been exposed and remove or obfuscate any sensitive information that could have been accessed by attackers.

Generated by OpenCVE AI on April 22, 2026 at 00:10 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 16 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 16 Dec 2025 21:00:00 +0000

Type Values Removed Values Added
First Time appeared Wedevs
Wedevs dokan
Wordpress
Wordpress wordpress
Vendors & Products Wedevs
Wedevs dokan
Wordpress
Wordpress wordpress

Tue, 16 Dec 2025 05:45:00 +0000

Type Values Removed Values Added
Description The Dokan Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the `/dokan/v1/wholesale/register` REST API endpoint in all versions up to, and including, 4.1.3. This makes it possible for unauthenticated attackers to enumerate users and retrieve their email addresses via the REST API by providing a user ID, along with other information such as usernames, display names, user roles, and registration dates.
Title dokan pro <= 4.1.3 - Missing Authorization to Unauthenticated Sensitive Information Exposure
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:53:00.867Z

Reserved: 2025-11-06T16:12:03.255Z

Link: CVE-2025-12809

cve-icon Vulnrichment

Updated: 2025-12-16T17:35:24.200Z

cve-icon NVD

Status : Deferred

Published: 2025-12-16T06:15:41.853

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12809

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T00:15:03Z

Weaknesses