[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fox7UdNhhLHN3kWQMv4OJUcHLyNicDpxvxjYPwhwgW9Q":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-12881","return-refund-and-exchange-for-woocommerce-insecure-direct-object-reference-to-authenticated-subscriber-arbitrary-order-","Return Refund and Exchange For WooCommerce \u003C= 4.5.5 - Insecure Direct Object Reference to Authenticated (Subscriber+) Arbitrary Order Message Read","The Return Refund and Exchange For WooCommerce plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.5.5 via the wps_rma_fetch_order_msgs() due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read other user's order messages.","woo-refund-and-exchange-lite",null,"\u003C=4.5.5","4.5.6","medium",5.4,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:L\u002FUI:N\u002FS:U\u002FC:L\u002FI:L\u002FA:N","Authorization Bypass Through User-Controlled Key","2025-11-20 18:56:54","2025-11-21 07:31:54",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F9c159237-1a3a-4d42-9a2e-fbd6ca98f38e?source=api-prod",1]