Insecure Direct Object Reference Vulnerability in OneClick Chat to Order Plugin for WordPress
CVE-2025-13526

7.5HIGH

Key Information:

Vendor

WordPress

Vendor
CVE Published:
22 November 2025

What is CVE-2025-13526?

The OneClick Chat to Order plugin for WordPress is susceptible to an Insecure Direct Object Reference, allowing unauthenticated attackers to access sensitive customer data through the 'wa_order_thank_you_override' function. By simply altering the order ID in the URL, attackers can expose private information such as names, email addresses, phone numbers, billing and shipping addresses, as well as order contents and payment methods. This vulnerability underscores the need for stringent access controls and proper validation methods to safeguard user data.

Affected Version(s)

OneClick Chat to Order * <= 1.0.8

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Md Shofiur Rahman
.
CVE-2025-13526 : Insecure Direct Object Reference Vulnerability in OneClick Chat to Order Plugin for WordPress