CVE-2025-6187
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-22

Last updated on: 2025-07-22

Assigner: Wordfence

Description
The bSecure plugin for WordPress is vulnerable to Privilege Escalation due to missing authorization within its order_info REST endpoint in versions 1.3.7 through 1.7.9. The plugin registers the /webhook/v2/order_info/ route with a permission_callback that always returns true, effectively bypassing all authentication. This makes it possible for unauthenticated attackers who know any user’s email to obtain a valid login cookie and fully impersonate that account.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-22
Last Modified
2025-07-22
Generated
2026-05-07
AI Q&A
2025-07-22
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 3 associated CPEs
Vendor Product Version / Range
wordpress wordpress *
woocommerce woocommerce *
bsecuretech bsecure 1.7.9
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The bSecure plugin for WordPress has a vulnerability in its order_info REST endpoint where the permission check always returns true, allowing unauthenticated attackers who know any user's email to bypass authentication and obtain a valid login cookie to fully impersonate that user.


How can this vulnerability impact me? :

This vulnerability can allow attackers to fully impersonate any user by obtaining their login cookie without authentication, potentially leading to unauthorized access to user accounts, data theft, and full control over affected accounts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart