VYPR
Medium severity4.3NVD Advisory· Published Nov 13, 2025· Updated Apr 27, 2026

CVE-2025-64269

CVE-2025-64269

Description

Missing Authorization vulnerability in EDGARROJAS WooCommerce PDF Invoice Builder woo-pdf-invoice-builder allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects WooCommerce PDF Invoice Builder: from n/a through <= 1.2.150.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Missing authorization in WooCommerce PDF Invoice Builder ≤1.2.150 allows unprivileged attackers to exploit incorrect access control security levels.

Vulnerability

Overview CVE-2025-64269 is a Missing Authorization vulnerability in the EDGARROJAS WooCommerce PDF Invoice Builder plugin (woo-pdf-invoice-builder) for WordPress [1]. The issue affects all versions from n/a through 1.2.150. The root cause is that the plugin incorrectly configures access control security levels, allowing functions to be executed without proper authorization checks [1].

Exploitation

This is a Broken Access Control vulnerability that can be exploited over the network without requiring authentication or user interaction [1]. Attackers can leverage this to perform actions normally reserved for higher-privileged users, such as administrators. The vulnerability is categorized as having a low severity (CVSS v3 score 4.3) and is considered unlikely to be exploited in isolation, but it is the type of flaw that can be used in mass-exploit campaigns targeting thousands of WordPress sites [1].

Impact

Successful exploitation allows an unprivileged attacker to bypass access controls and potentially access or modify sensitive data, including PDF invoices, without proper authorization [1]. The impact is limited to unauthorized access to functionality that should require higher privileges, but does not directly lead to complete site compromise.

Mitigation

The vendor has released version 1.2.151, which patches the missing authorization issue by implementing proper access control checks [1]. Users are strongly advised to update to this version or later immediately. Those running Patchstack can enable auto-updates for vulnerable plugins [1].

AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.