CVE-2025-12809
Unauthorized Data Access in Dokan Pro REST API Endpoint
Publication date: 2025-12-16
Last updated on: 2025-12-16
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| dokan | dokan_pro | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The vulnerability in the Dokan Pro plugin for WordPress is due to a missing capability check on the /dokan/v1/wholesale/register REST API endpoint in versions up to 4.1.3. This flaw allows unauthenticated attackers to access user data without authorization by providing a user ID. Attackers can enumerate users and retrieve sensitive information such as email addresses, usernames, display names, user roles, and registration dates via the REST API.
How can this vulnerability impact me? :
This vulnerability can impact you by allowing unauthorized individuals to access and collect sensitive user information such as email addresses, usernames, display names, user roles, and registration dates. This unauthorized data exposure can lead to privacy breaches, targeted phishing attacks, and potential misuse of user information.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
You can detect this vulnerability by attempting to access the vulnerable REST API endpoint `/dokan/v1/wholesale/register` without authentication and checking if user data such as email addresses, usernames, display names, user roles, and registration dates are returned. For example, you can use the following curl command to test this: curl -X GET https://your-wordpress-site.com/wp-json/dokan/v1/wholesale/register?user_id=1 If the response returns user information without authentication, your system is vulnerable.
What immediate steps should I take to mitigate this vulnerability?
The immediate mitigation step is to update the Dokan Pro plugin to a version later than 4.1.3 where authorization checks have been added to the wholesale customer registration API endpoint to prevent unauthorized access. If updating is not immediately possible, restrict access to the REST API endpoint `/dokan/v1/wholesale/register` via firewall rules or other access control methods to prevent unauthenticated requests. [2]
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The vulnerability allows unauthenticated attackers to access user data such as email addresses, usernames, display names, user roles, and registration dates via the REST API. This unauthorized access to personal data could lead to non-compliance with data protection regulations like GDPR and HIPAA, which require strict controls on personal data access and protection against unauthorized disclosure. [2]