Description

The OneClick Chat to Order plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 1.0.8 via the 'wa_order_thank_you_override' function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to view sensitive customer information including names, email addresses, phone numbers, billing/shipping addresses, order contents, and payment methods by simply changing the order ID in the URL.

INFO

Published Date :

2025-11-22T11:08:38.686Z

Last Modified :

2026-04-08T16:53:21.023Z

Source :

Wordfence
AFFECTED PRODUCTS

The following products are affected by CVE-2025-13526 vulnerability.

Vendors Products
Walterpinem
  • Oneclick Chat To Order
Wordpress
  • Wordpress

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact