Description
The Dokan: AI Powered WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.1 via the '/dokan/v1/stores/{id}/reviews' REST API endpoint. This is due to the 'prepare_reviews_for_response' method including reviewer email addresses, usernames, and user IDs in the API response. This makes it possible for unauthenticated attackers to extract email addresses, usernames, and user IDs of all customers who left reviews on any vendor's store. The Pro version of the plugin must be installed and activated, with store reviews enabled, in order to exploit the vulnerability.
Published: 2026-05-02
Score: 5.3 Medium
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An unauthenticated attacker can trigger the Dokan REST endpoint that returns all reviews for a vendor store and in the response the attacker receives reviewer email addresses, usernames, and user IDs. This information is not meant to be public, so the vulnerability constitutes Sensitive Information Exposure as defined by CWE‑200. The impact is that attackers can expose customer identities and potentially use the data for phishing or further attacks. The severity is moderate, reflected in the CVSS score of 5.3.

Affected Systems

Dokan's AI Powered WooCommerce Multivendor Marketplace Solution plugin for WordPress is affected. The vulnerability exists in all releases up to and including version 4.3.1. The Pro edition must be installed and activated, and store reviews must be enabled, for the flaw to be exploitable. The issue is localized to the "/dokan/v1/stores/{id}/reviews" REST API endpoint. Users who rely on the Pro feature and have store reviews enabled are at risk.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate overall risk. The EPSS score is not available, and the vulnerability is not listed in CISA's KEV catalog, so no known mass exploitation evidence exists yet. The vulnerability can be exploited by making an unauthenticated HTTP GET request to the review endpoint. Because the request does not require authentication, an attacker can retrieve the entire review payload. The only prerequisite is that the Pro version is activated and reviews are enabled. Because the data exposed includes sensitive customer identifiers, the risk to confidentiality is high, but no direct denial of service or code execution occurs.

Generated by OpenCVE AI on May 2, 2026 at 14:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Dokan plugin to the latest version (4.3.2 or newer) which removes user identifiers from the review API response.
  • If an immediate update is not possible, uninstall or deactivate the Pro module or disable store reviews so that the review endpoint no longer returns personal data.
  • Restrict access to the Dokan review REST endpoint to authenticated users only by adding an access control rule or using a security plugin.

Generated by OpenCVE AI on May 2, 2026 at 14:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 13:30:00 +0000

Type Values Removed Values Added
Description The Dokan: AI Powered WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.3.1 via the '/dokan/v1/stores/{id}/reviews' REST API endpoint. This is due to the 'prepare_reviews_for_response' method including reviewer email addresses, usernames, and user IDs in the API response. This makes it possible for unauthenticated attackers to extract email addresses, usernames, and user IDs of all customers who left reviews on any vendor's store. The Pro version of the plugin must be installed and activated, with store reviews enabled, in order to exploit the vulnerability.
Title Dokan: AI Powered WooCommerce Multivendor Marketplace Solution <= 4.3.1 - Unauthenticated Information Disclosure in Store Reviews REST API Endpoint
Weaknesses CWE-200
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-02T13:26:09.111Z

Reserved: 2026-03-04T00:40:30.086Z

Link: CVE-2026-3504

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-05-02T14:16:17.847

Modified: 2026-05-02T14:16:17.847

Link: CVE-2026-3504

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T14:45:44Z

Weaknesses