The WC Plus plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pluswc_logo_favicon_logo_base' AJAX action in all versions up to, and including, 1.2.0. This makes it possible for unauthenticated attackers to update the site's favicon logo base.
Metrics
Affected Vendors & Products
References
History
Mon, 25 Aug 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sat, 23 Aug 2025 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Sat, 23 Aug 2025 04:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The WC Plus plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pluswc_logo_favicon_logo_base' AJAX action in all versions up to, and including, 1.2.0. This makes it possible for unauthenticated attackers to update the site's favicon logo base. | |
| Title | WC Plus <= 1.2.0 - Missing Authorization to Unauthenticated Settings Manipulation | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-08-23T04:25:48.541Z
Updated: 2025-08-25T16:44:00.584Z
Reserved: 2025-07-18T17:37:39.899Z
Link: CVE-2025-7821
Updated: 2025-08-25T16:43:55.594Z
Status : Awaiting Analysis
Published: 2025-08-23T05:15:32.393
Modified: 2025-08-25T20:24:45.327
Link: CVE-2025-7821
No data.