Description
The OneClick Chat to Order plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.8 via the 'wa_order_thank_you_override' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view sensitive customer information including names, email addresses, phone numbers, billing/shipping addresses, order contents, and payment methods by simply changing the order ID in the URL.
Published: 2025-11-22
Score: 7.5 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 24 Nov 2025 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Walterpinem
Walterpinem oneclick Chat To Order
Wordpress
Wordpress wordpress
Vendors & Products Walterpinem
Walterpinem oneclick Chat To Order
Wordpress
Wordpress wordpress

Sat, 22 Nov 2025 11:15:00 +0000

Type Values Removed Values Added
Description The OneClick Chat to Order plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.8 via the 'wa_order_thank_you_override' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view sensitive customer information including names, email addresses, phone numbers, billing/shipping addresses, order contents, and payment methods by simply changing the order ID in the URL.
Title OneClick Chat to Order <= 1.0.8 - Insecure Direct Object Reference to Unauthenticated Sensitive Information Exposure
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


Subscriptions

Walterpinem Oneclick Chat To Order
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2025-11-24T19:35:47.203Z

Reserved: 2025-11-21T19:46:22.700Z

Link: CVE-2025-13526

cve-icon Vulnrichment

Updated: 2025-11-24T19:35:42.981Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-22T11:15:48.857

Modified: 2025-11-25T22:16:42.557

Link: CVE-2025-13526

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-11-24T09:08:21Z

Weaknesses