The WC Plus plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pluswc_logo_favicon_logo_base' AJAX action in all versions up to, and including, 1.2.0. This makes it possible for unauthenticated attackers to update the site's favicon logo base.
Metrics
Affected Vendors & Products
References
History
Mon, 25 Aug 2025 21:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 23 Aug 2025 11:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Wordpress
Wordpress wordpress |
|
Vendors & Products |
Wordpress
Wordpress wordpress |
Sat, 23 Aug 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The WC Plus plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'pluswc_logo_favicon_logo_base' AJAX action in all versions up to, and including, 1.2.0. This makes it possible for unauthenticated attackers to update the site's favicon logo base. | |
Title | WC Plus <= 1.2.0 - Missing Authorization to Unauthenticated Settings Manipulation | |
Weaknesses | CWE-862 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-08-23T04:25:48.541Z
Updated: 2025-08-25T16:44:00.584Z
Reserved: 2025-07-18T17:37:39.899Z
Link: CVE-2025-7821

Updated: 2025-08-25T16:43:55.594Z

Status : Awaiting Analysis
Published: 2025-08-23T05:15:32.393
Modified: 2025-08-25T20:24:45.327
Link: CVE-2025-7821

No data.