Introduction
Attackers can assume administrative control of WordPress e-commerce sites running BeyondCart Connector by exploiting a critical flaw in JWT authentication. This vulnerability impacts customer data, site integrity, and the trustworthiness of mobile commerce integrations.
About BeyondCart and the BeyondCart Connector: BeyondCart is a SaaS platform that enables WordPress and WooCommerce sites to offer native mobile shopping apps. Their BeyondCart Connector plugin is widely used to synchronize e-commerce data between WordPress sites and mobile apps, serving thousands of small to medium-sized retailers seeking mobile-first strategies. The plugin's integration is essential for real-time order processing and customer engagement, making its security vital for online businesses.
Technical Information
CVE-2025-8570 is a privilege escalation vulnerability in the BeyondCart Connector plugin for WordPress. The flaw is rooted in improper management of JWT (JSON Web Token) secrets and insufficient authorization logic within the plugin's use of the determine_current_user
filter. This filter is a WordPress hook that allows plugins to override the default user identification mechanism during authentication.
The plugin uses either hard-coded or predictable JWT secrets, violating cryptographic best practices. Attackers can analyze the plugin code or deployment to discover the static secret or predict it. Once the secret is known, an attacker can craft arbitrary JWT tokens with any desired claims, including administrator privileges. These forged tokens are then accepted by the plugin as valid, allowing unauthenticated users to impersonate any account, including administrative users.
The vulnerability is classified as CWE-798 (Use of Hard-coded Credentials). No public code snippets or proof of concept are available at this time. The vulnerability affects BeyondCart Connector versions 1.4.2 through 2.1.0.
Affected Systems and Versions
- BeyondCart Connector plugin for WordPress
- Affected versions: 1.4.2 through 2.1.0
- All configurations using the plugin in this version range are vulnerable
Vendor Security History
Wordfence has previously reported security issues related to JWT implementation in the BeyondCart Connector plugin. This suggests recurring challenges in the vendor's authentication design and secure coding practices. The vendor's patch response time and overall security maturity are areas of concern, especially given the criticality of this and prior vulnerabilities.