Primer MyData for Woocommerce Vulnerability (Medium) – CVE-2025-69325

Primer MyData for Woocommerce Vulnerability (Medium) – CVE-2025-69325

by | Feb 17, 2026 | Plugins

Attack Vectors

CVE-2025-69325 is a Medium-severity vulnerability in the Primer MyData for Woocommerce WordPress plugin (slug: primer-mydata) affecting versions up to and including 4.2.8. It is an unauthenticated Path Traversal issue, which means an attacker can reach the vulnerable behavior over the network without logging in.

From a business-risk standpoint, this matters because unauthenticated attacks are easier to scale and automate. Attackers may attempt to manipulate how the plugin handles file paths to trigger actions involving files outside the intended directory.

Security Weakness

The weakness is Path Traversal: the plugin does not sufficiently restrict file path handling, allowing requests to reference locations outside the directory the feature was meant to use. According to the reported impact, this can allow attackers to perform actions on files outside the originally intended directory.

The CVSS 3.1 score is 5.3 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N), reflecting that the attack can be performed remotely with low complexity and no authentication. While the report indicates no direct confidentiality or availability impact, it does indicate an integrity impact (I:L), which can still create meaningful business exposure.

Technical or Business Impacts

Even at Medium severity, file-handling weaknesses can introduce operational and compliance risks. If attackers can perform unauthorized actions on files outside the intended directory, that may lead to unexpected changes that undermine site reliability, disrupt ecommerce workflows, or create conditions for additional abuse.

For marketing directors and business leaders, the key concern is business continuity and trust. Website issues can impact conversions, campaign performance, customer experience, and brand reputation. For compliance teams, unplanned changes to site behavior or data-processing components may raise questions around change control, audit readiness, and incident response obligations.

Remediation: Update Primer MyData for Woocommerce to version 4.2.9 or a newer patched version as recommended by the source. Track the issue under CVE-2025-69325 for internal risk and patch-management reporting.

Similar Attacks

Path Traversal has been a recurring pattern across web applications and plugins. Recent examples include:

CVE-2024-27956 (WordPress plugin path traversal example)

CVE-2023-0669 (GoAnywhere MFT path traversal, widely exploited)

CVE-2021-41773 (Apache HTTP Server path traversal)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers