Atomic Edge analysis of CVE-2025-68035:
This vulnerability is an unauthenticated information exposure flaw in the Tabby Checkout WordPress plugin. The vulnerability affects all plugin versions up to and including 5.8.4, allowing attackers to extract sensitive user data via a publicly accessible AJAX endpoint. The CVSS score of 5.3 reflects a moderate severity rating.
Atomic Edge research identified the root cause as an improperly secured AJAX handler. The vulnerable function `get_order_history()` in `/includes/class-wc-tabby-ajax.php` was registered via `add_action(‘wc_ajax_get_order_history’, array(__CLASS__, ‘get_order_history’))` at line 4. This endpoint accepted `email` and `phone` query parameters via `get_query_var()` calls at lines 60-61. The function performed a nonce check with `check_ajax_referer()` at line 57, but this check could be bypassed because the endpoint was accessible to unauthenticated users.
The exploitation method involves sending a POST request to the WordPress AJAX handler endpoint `/wp-admin/admin-ajax.php` with the action parameter set to `get_order_history`. Attackers can append email or phone parameters as query strings to retrieve order history data. The payload structure is a standard WordPress AJAX request: `action=get_order_history&security=[valid_nonce]`. The nonce value can be obtained from the publicly exposed `get_order_history_nonce` parameter in the `wc-checkout` script data, which was exposed via the `get_script_data()` function at line 13.
The patch completely removes the vulnerable functionality. In `/includes/class-wc-tabby-ajax.php`, developers deleted the `get_order_history()` function entirely (lines 56-71 removed). They also removed the AJAX action registration at line 4, the nonce generation at line 13, and the query variable registration for `email` and `phone` at lines 17-18. Additionally, the patch removes the `tabby_checkout_promo_theme` configuration option from `/includes/class-wc-settings-tab-tabby.php` (lines 240-246) and cleans up related theme configuration functions in `/includes/class-wc-tabby-promo.php`.
Successful exploitation allows unauthenticated attackers to retrieve order history data associated with specific email addresses or phone numbers. This exposes sensitive customer information including purchase history, order details, and potentially personal identifiers. The data exposure violates privacy expectations and could facilitate further targeted attacks using the harvested information.







