CVE-2025-14977
Dokan: · Dokan: AI Powered WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy
A high-severity vulnerability has been identified in the Dokan WordPress plugin, a popular solution for creating multi-vendor marketplaces.
Executive summary
A high-severity vulnerability has been identified in the Dokan WordPress plugin, a popular solution for creating multi-vendor marketplaces. This flaw, known as an Insecure Direct Object Reference (IDOR), could allow an authenticated attacker to bypass authorization checks and access or modify sensitive data belonging to other users, such as order details or personal information. Organizations using the affected plugin are exposed to a significant risk of data breaches and should apply the vendor-provided update immediately.
Vulnerability
The vulnerability is an Insecure Direct Object Reference (IDOR). This type of flaw occurs when the application uses a user-supplied identifier (e.g., an order ID, user ID, or file name) to directly access a database record or file without verifying that the logged-in user has the necessary permissions to access that specific object. An authenticated attacker could exploit this by manipulating these identifiers in HTTP requests to view, modify, or delete data belonging to other users on the platform, leading to unauthorized information disclosure and data tampering.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.1. Successful exploitation could lead to a significant data breach, exposing sensitive customer and vendor information, including order histories, contact details, and potentially personally identifiable information (PII). The business impact includes severe reputational damage, loss of customer trust, financial losses from fraudulent activities, and potential regulatory fines for non-compliance with data protection regulations like GDPR or CCPA.
Remediation
Immediate Action: Immediately update the "Dokan: AI Powered WooCommerce Multivendor Marketplace Solution" plugin to the latest version that addresses this vulnerability. After updating, review all WordPress security settings and user permissions to ensure they follow the principle of least privilege. If the plugin is no longer essential for business operations, consider deactivating and removing it to reduce the attack surface.
Proactive Monitoring: Monitor web server and application access logs for anomalous activity, such as a single user or IP address making numerous sequential requests by iterating through numerical IDs in URL parameters (e.g., .../view_order?id=101, .../view_order?id=102). Implement alerts for attempts to access resources that result in authorization failures, as this may indicate an attacker is probing for this vulnerability.
Compensating Controls: If immediate patching is not feasible, implement a Web Application Firewall (WAF) with custom rules designed to detect and block common IDOR attack patterns. Enforce strict access control policies at the application layer and conduct a thorough review of user roles and capabilities within the Dokan plugin to limit potential exposure.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 8.1 and the direct risk of a sensitive data breach, this vulnerability requires immediate attention. We strongly recommend that all organizations using the affected Dokan plugin apply the vendor-supplied patch without delay. Although this CVE is not currently listed on the CISA Known Exploited Vulnerabilities (KEV) catalog, its severity warrants treating it with the highest priority to prevent potential exploitation and protect customer and business data.