Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 24 Nov 2025 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 24 Nov 2025 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Walterpinem
Walterpinem oneclick Chat To Order Wordpress Wordpress wordpress |
|
| Vendors & Products |
Walterpinem
Walterpinem oneclick Chat To Order Wordpress Wordpress wordpress |
Sat, 22 Nov 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The OneClick Chat to Order plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.8 via the 'wa_order_thank_you_override' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view sensitive customer information including names, email addresses, phone numbers, billing/shipping addresses, order contents, and payment methods by simply changing the order ID in the URL. | |
| Title | OneClick Chat to Order <= 1.0.8 - Insecure Direct Object Reference to Unauthenticated Sensitive Information Exposure | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2025-11-24T19:35:47.203Z
Reserved: 2025-11-21T19:46:22.700Z
Link: CVE-2025-13526
Updated: 2025-11-24T19:35:42.981Z
Status : Awaiting Analysis
Published: 2025-11-22T11:15:48.857
Modified: 2025-11-25T22:16:42.557
Link: CVE-2025-13526
No data.
OpenCVE Enrichment
Updated: 2025-11-24T09:08:21Z