Ameeba Chat App store presentation
Join the Cybersecurity Chat on Ameeba
Connect with pros, students, and researchers — in real time

Ameeba Blog Search

CVE-2025-9054: Unauthorized Data Modification Vulnerability in WooCommerce Multi Locations Inventory Management Plugin for WordPress

Ameeba’s Mission: Our mission is to safeguard freedom from surveillance through anonymization.

Overview

A high-severity vulnerability, dubbed CVE-2025-9054, has been discovered in the MultiLoca – WooCommerce Multi Locations Inventory Management plugin, a popular inventory management plugin for WordPress websites. This vulnerability could allow an unauthenticated attacker to modify data, leading to privilege escalation. Any website that utilizes this plugin for inventory management and is running a version up to, and including, 4.2.8 is at risk.
This vulnerability matters because it can lead to a complete system compromise or significant data leakage. Given the popularity of WordPress and the widespread use of WooCommerce plugins, the potential attack vector is massive. The severity of the vulnerability, combined with the potential impact, necessitates immediate action from all affected users.

Vulnerability Summary

CVE ID: CVE-2025-9054
Severity: Critical (9.8)
Attack Vector: Network
Privileges Required: None
User Interaction: None
Impact: Unauthorized modification of data, privilege escalation, potential system compromise, and data leakage

Affected Products

Ameeba Chat Icon Escape the Surveillance Era

Most apps won’t tell you the truth.
They’re part of the problem.

Phone numbers. Emails. Profiles. Logs.
It’s all fuel for surveillance.

Ameeba Chat gives you a way out.

  • • No phone number
  • • No email
  • • No personal info
  • • Anonymous aliases
  • • End-to-end encrypted

Chat without a trace.

Product | Affected Versions

MultiLoca – WooCommerce Multi Locations Inventory Management plugin for WordPress | Up to and including 4.2.8

How the Exploit Works

The vulnerability stems from a missing capability check on the ‘wcmlim_settings_ajax_handler’ function in the affected versions of the plugin. This absence means that unauthenticated attackers can update arbitrary options on the WordPress site without requiring any privileges or user interaction. An attacker can leverage this vulnerability to update the default role for registration to administrator and enable user registration. This would allow the attacker to register as an administrator and gain full access to the vulnerable site.

Conceptual Example Code

Below is a conceptual example of how the vulnerability might be exploited. This is a sample HTTP POST request that an attacker might use:

POST /wp-admin/admin-ajax.php?action=wcmlim_settings_ajax_handler HTTP/1.1
Host: vulnerable-website.com
Content-Type: application/x-www-form-urlencoded
wcmlim_options[default_role]=administrator&wcmlim_options[user_registration]=1

In this example, the attacker sends an HTTP POST request to the ‘admin-ajax.php’ file with the ‘wcmlim_settings_ajax_handler’ action. They then modify the ‘default_role’ and ‘user_registration’ options, setting the default role to ‘administrator’ and enabling user registration.

Want to discuss this further? Join the Ameeba Cybersecurity Group Chat.

Disclaimer:

The information and code presented in this article are provided for educational and defensive cybersecurity purposes only. Any conceptual or pseudocode examples are simplified representations intended to raise awareness and promote secure development and system configuration practices.

Do not use this information to attempt unauthorized access or exploit vulnerabilities on systems that you do not own or have explicit permission to test.

Ameeba and its authors do not endorse or condone malicious behavior and are not responsible for misuse of the content. Always follow ethical hacking guidelines, responsible disclosure practices, and local laws.
Ameeba Chat