CVE-2025-62935
ilmosys · ilmosys Open Close Multiple Products
A high-severity Missing Authorization vulnerability has been identified in multiple ilmosys Open Close products, specifically impacting the WooCommerce Store plugin.
Executive summary
A high-severity Missing Authorization vulnerability has been identified in multiple ilmosys Open Close products, specifically impacting the WooCommerce Store plugin. This flaw allows an attacker to bypass security controls and perform actions without proper permissions, potentially leading to unauthorized modification of store settings, operational disruption, and data exposure. Organizations using the affected software are at significant risk and should take immediate action to mitigate this threat.
Vulnerability
The vulnerability is a Missing Authorization flaw within the woc-open-close WooCommerce plugin. The application fails to properly verify that a user has the required privileges before allowing access to sensitive functions. An unauthenticated or low-privileged attacker can send a specially crafted request to an administrative endpoint, which the system will process without validating the user's authorization level. This could allow the attacker to modify critical store settings, such as opening and closing times, or access functions normally restricted to administrators.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.1, posing a significant risk to business operations and security. Successful exploitation could lead to direct operational disruption by allowing an attacker to change the store's availability, resulting in lost revenue and customer confusion. Furthermore, unauthorized access to administrative functions could lead to reputational damage, exposure of sensitive store or customer data, and could serve as a pivot point for a more comprehensive compromise of the web application and underlying server.
Remediation
Immediate Action: The primary remediation is to apply the security updates provided by the vendor across all affected installations immediately. After patching, it is crucial to review web server and application access logs for any signs of compromise or exploitation attempts that may have occurred prior to the update.
Proactive Monitoring: Implement continuous monitoring of application and web server logs. Specifically, look for unusual or direct requests to the woc-open-close plugin's administrative functions, especially from unexpected IP addresses or low-privileged user accounts. An increase in 403 (Forbidden) errors after patching may indicate ongoing scanning or exploitation attempts being successfully blocked.
Compensating Controls: If immediate patching is not feasible, consider implementing the following compensating controls:
- Deploy a Web Application Firewall (WAF) with rules to block unauthorized access to the plugin's sensitive endpoints.
- Restrict access to the website's administrative dashboard (e.g.,
/wp-admin/) to trusted IP addresses only. - If the plugin's functionality is not critical, temporarily disable it until a patch can be safely applied and tested.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 8.1 and the potential for direct business impact, we strongly recommend that organizations treat this vulnerability with high urgency. The primary and most effective course of action is to apply the vendor-supplied security patch immediately. Although this CVE is not currently on the CISA KEV list, its high severity and the popularity of WooCommerce mean that widespread exploitation could occur rapidly. Proactive patching is the most critical step to prevent compromise.