CVE-2025-12820
Description
The Pure WC Variation Swatches WordPress plugin through 1.1.7 does not have an authorization check when updating its settings, which could allow any authenticated users to update them.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Pure WC Variation Swatches plugin through 1.1.7 lacks authorization checks when updating settings, allowing any authenticated user to modify them.
Missing
Authorization in Settings Update The Pure WC Variation Swatches WordPress plugin through version 1.1.7 contains a missing authorization vulnerability in its settings update functionality. The plugin fails to perform an authorization check (CWE-862) when processing requests to update its configuration [1]. This means that any authenticated user, regardless of their role or capabilities, can modify the plugin's settings.
Attack
Surface and Prerequisites The attack requires the attacker to be authenticated as a user on the WordPress site. No special privileges such as administrator or editor are needed; even a subscriber-level account can exploit this vulnerability. The attacker sends a crafted request to the settings update endpoint, and due to the lack of authorization verification, the request is processed successfully [1].
Impact
By exploiting this vulnerability, an authenticated attacker can change the plugin's settings arbitrarily. This could lead to changes in how product variations and swatches are displayed, potentially causing defacement or disrupting the functionality of the WooCommerce product pages. In some scenarios, the attacker might be able to inject malicious content or alter pricing data if those settings are exposed.
Mitigation
Status As of the publication date, there is no known fix for this vulnerability. The plugin version 1.1.7 is the last affected version, and no patched version has been released. Users are advised to disable the plugin or implement a workaround such as role-based access control until a fix becomes available [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2- Range: <=1.1.7
- Range: <=1.1.7
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.