First published: Wed May 07 2025(Updated: )
The WPshop 2 – E-Commerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions 2.0.0 to 2.6.0 via the callback_generate_api_key() due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to create valid API keys on behalf of other users.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
WPshop E-Commerce plugin for WordPress | >=2.0.0<=2.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-3853 has a medium severity rating, making it a significant risk for affected installations.
To fix CVE-2025-3853, update the WPshop E-Commerce plugin to version 2.6.1 or later, which addresses this vulnerability.
CVE-2025-3853 affects users of the WPshop E-Commerce plugin for WordPress versions 2.0.0 to 2.6.0.
CVE-2025-3853 is an Insecure Direct Object Reference (IDOR) vulnerability.
Authenticated attackers with Subscriber-level access can exploit CVE-2025-3853 to gain unauthorized access to sensitive API keys.