Premmerce Wholesale Pricing for WooCommerce Vulnerability (Medium) …

Premmerce Wholesale Pricing for WooCommerce Vulnerability (Medium) …

by | Feb 25, 2026 | Plugins

Attack Vectors

Premmerce Wholesale Pricing for WooCommerce (slug: premmerce-woocommerce-wholesale-pricing) versions 1.1.10 and earlier contain a Medium-severity missing-authorization issue (CVE-2025-64285, CVSS 4.3).

The key risk is that an authenticated WordPress user with contributor-level access or higher may be able to trigger a plugin function that lacks a required capability (permission) check. In practical terms, this means the attack does not require “hacking” in the traditional sense—only a valid login at a relatively low privilege level.

This can become relevant in environments where multiple people have accounts (marketing teams, agencies, content contractors, interns, or third-party vendors), or where credentials are reused or exposed via phishing. More details are available in the CVE record: https://www.cve.org/CVERecord?id=CVE-2025-64285.

Security Weakness

The vulnerability is described as a missing capability check on a plugin function. Capability checks are a core WordPress control that ensures only the right roles can perform sensitive actions. When that check is missing, users who should not have access may be able to execute actions that were intended only for admins or store managers.

Because the issue requires authentication (but only low privileges), it is especially important for organizations that maintain many user accounts or delegate content management. Even if your admin accounts are well protected, a contributor account can be a softer target for attackers.

According to the published guidance, the remediation is straightforward: update Premmerce Wholesale Pricing for WooCommerce to version 1.1.11 or newer (patched). Reference source: https://www.wordfence.com/threat-intel/vulnerabilities/id/3c63da0f-4be0-4716-8bde-4f2d4250f4af.

Technical or Business Impacts

While the published information indicates limited impact (CVSS reflects low integrity impact and no confirmed confidentiality or availability impact), this type of authorization gap can still create meaningful business risk for eCommerce and pricing-sensitive operations.

Potential business impacts include:

Unauthorized changes to plugin-managed actions that could affect how wholesale pricing is applied or managed, leading to pricing mistakes, margin erosion, or customer disputes. Even a small, temporary misconfiguration can have outsized impact during promotions or high-volume periods.

Operational disruption from incident response work: investigating what was changed, when it happened, and whether order totals or customer experiences were affected. This can pull time from marketing, finance, and operations teams—especially if reporting and reconciliation are required.

Compliance and governance concerns for organizations that require strict role-based access control. A missing authorization check can undermine internal controls, raising questions during audits or vendor risk reviews.

Recommended action for leadership and compliance teams: confirm whether the plugin is installed and on a vulnerable version, then prioritize upgrading to 1.1.11+. In parallel, review who has contributor (or higher) access, remove unused accounts, and ensure strong login protections are in place to reduce the likelihood of credential-based misuse.

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers