CVE-2025-12039
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-21

Last updated on: 2025-11-21

Assigner: Wordfence

Description
The BigBuy Dropshipping Connector for WooCommerce plugin for WordPress is vulnerable to IP Address Spoofing in all versions up to, and including, 2.0.5 due to insufficient IP address validation and use of user-supplied HTTP headers as a primary method for IP retrieval. This makes it possible for unauthenticated attackers to retrieve the output of phpinfo().
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-21
Last Modified
2025-11-21
Generated
2026-05-07
AI Q&A
2025-11-21
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bigbuy dropshipping_connector 2.0.5
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in the BigBuy Dropshipping Connector for WooCommerce plugin for WordPress allows unauthenticated attackers to spoof IP addresses because the plugin does not properly validate IP addresses and relies on user-supplied HTTP headers to determine the IP. This flaw enables attackers to retrieve the output of the phpinfo() function, which can expose sensitive server configuration information.


How can this vulnerability impact me? :

The vulnerability can impact you by allowing attackers to obtain detailed server configuration information through phpinfo() output. This information disclosure can aid attackers in further exploiting the system or understanding its environment, potentially leading to additional security risks.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart