Monitor vulnerabilities like this one.
Sign up free to get alerted when software you use is affected.
5.3
Riaxe Product Customizer plugin exposes sensitive customer data on WordPress sites
CVE-2026-3594
Summary
The Riaxe Product Customizer plugin on WordPress sites allows anyone to access sensitive customer information, such as names and order details, without needing a password. This is a concern for sites using the plugin, as it could put customer data at risk. Update the plugin to a version 2.5 or later to fix this issue.
Original title
The Riaxe Product Customizer plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.4 via the '/wp-json/InkXEProductDesignerLite/orders' REST A...
Original description
The Riaxe Product Customizer plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 2.4 via the '/wp-json/InkXEProductDesignerLite/orders' REST API endpoint. The endpoint is registered with 'permission_callback' set to '__return_true', meaning no authentication or authorization checks are performed. The endpoint queries WooCommerce order data from the database and returns it to the requester, including customer first and last names, customer IDs, order IDs, order totals, order dates, currencies, and order statuses. This makes it possible for unauthenticated attackers to extract sensitive customer and order information from the WooCommerce store.
nvd CVSS3.1
5.3
Vulnerability type
CWE-200
Information Exposure
- https://plugins.trac.wordpress.org/browser/riaxe-product-customizer/tags/2.4/ria...
- https://plugins.trac.wordpress.org/browser/riaxe-product-customizer/tags/2.4/ria...
- https://plugins.trac.wordpress.org/browser/riaxe-product-customizer/tags/2.4/ria...
- https://plugins.trac.wordpress.org/browser/riaxe-product-customizer/tags/2.4/ria...
- https://plugins.trac.wordpress.org/browser/riaxe-product-customizer/trunk/riaxe-...
- https://plugins.trac.wordpress.org/browser/riaxe-product-customizer/trunk/riaxe-...
- https://plugins.trac.wordpress.org/browser/riaxe-product-customizer/trunk/riaxe-...
- https://plugins.trac.wordpress.org/browser/riaxe-product-customizer/trunk/riaxe-...
- https://www.wordfence.com/threat-intel/vulnerabilities/id/2ffd6393-6604-48d9-ba2...
Published: 8 Apr 2026 · Updated: 9 Apr 2026 · First seen: 8 Apr 2026