Order Splitter for WooCommerce Vulnerability (Medium) – CVE-2025-12075

Order Splitter for WooCommerce Vulnerability (Medium) – CVE-2025-12075

by | Feb 17, 2026 | Plugins

Attack Vectors

Order Splitter for WooCommerce (slug: woo-order-splitter) is affected by a Medium-severity vulnerability (CVSS 4.3, CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N) tracked as CVE-2025-12075.

The issue can be exploited by an attacker who already has a login with Subscriber-level access or higher. From there, they can target an AJAX endpoint used by the plugin (the wos_troubleshooting endpoint) to access information related to other customers’ orders—without needing to trick an admin or require additional user interaction.

This matters for organizations where many users have accounts (customers, partners, contractors, or internal staff) because a low-privilege account is often easier to obtain through password reuse, credential stuffing, or accidental account creation than an administrator account.

Security Weakness

The root cause is a missing authorization (capability) check on the plugin’s wos_troubleshooting AJAX endpoint in versions up to and including 5.3.5. In practical terms, the plugin does not sufficiently verify whether the logged-in user is allowed to view the requested order data.

Because the weakness affects an authenticated endpoint, it is not a “drive-by” public exploit—however, the required access level (Subscriber+) is low enough that it can still be a realistic threat for eCommerce brands and multi-user WordPress environments.

Remediation: Update Order Splitter for WooCommerce to version 5.3.6 or newer, which contains the fix.

Technical or Business Impacts

This vulnerability enables order information exposure. While the severity is rated Medium, the business impact can be significant because order records often contain customer-related details that can drive reputational damage and compliance exposure if accessed improperly.

Business risks you should consider: customer trust erosion, increased support burden (“why is my order visible?”), potential data protection obligations depending on what information is exposed, and downstream fraud or social engineering risks if attackers learn customer purchase patterns.

Operationally, this can also disrupt reporting integrity and executive visibility: if stakeholders suspect order data confidentiality is compromised, it can affect decision-making, partner confidence, and brand reputation—especially for organizations with regulated customers or strict contractual privacy commitments.

Similar Attacks

Authorization gaps and insecure access control are a common theme in real-world breaches and advisories. Examples you can review include:

OWASP: Broken Access Control (Top 10)
Verizon Data Breach Investigations Report (DBIR)
CISA Alerts (security incidents and advisories)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers