VYPR
Medium severity4.3NVD Advisory· Published Oct 27, 2025· Updated Apr 27, 2026

CVE-2025-62935

CVE-2025-62935

Description

Missing Authorization vulnerability in StackWC Open Close WooCommerce Store woc-open-close allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Open Close WooCommerce Store: from n/a through <= 5.0.0.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization vulnerability in Open Close WooCommerce Store plugin up to 5.0.0 allows unauthenticated attackers to exploit access control flaws.

Vulnerability

Overview

The Open Close WooCommerce Store plugin for WordPress (woc-open-close) versions up to and including 5.0.0 suffer from a missing authorization vulnerability. This issue arises from incorrect configuration of access control security levels, allowing unauthenticated or low-privileged users to perform actions that should require higher privileges [1].

Exploitation

Attackers can exploit this vulnerability by sending crafted requests to the plugin's functions that lack proper authorization checks. No authentication is required, making it possible for anyone with network access to the WordPress site to trigger the missing authorization flaw. The vulnerability is considered part of a broken access control category, which is common in WordPress plugins [1].

Impact

Successful exploitation enables an attacker to perform unauthorized actions, such as modifying plugin settings or accessing restricted data. This can lead to further compromise of the WordPress site, including potential denial of service or data manipulation. The CVSS v3 base score of 4.3 (Medium) reflects the potential for exploitation without authentication but with some limitations on impact [1].

Mitigation

The vendor has not released a patch beyond version 5.0.0, and users are advised to update the plugin to the latest available version. If an update is not possible, consider disabling the plugin or implementing additional access controls via a Web Application Firewall (WAF) or server-level rules. This vulnerability is noted as being used in mass-exploit campaigns, so immediate action is recommended [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.