CVE-2025-14294

Plain English Summary

AI-powered analysis for quick understanding

Attackers can change the billing and shipping contact information, like email and phone numbers, for any WooCommerce order just by knowing or guessing the order ID. This vulnerability exists because the plugin doesn't properly check if the attacker is authorized, allowing anyone to make these changes without needing to log in.

Technical Description

The Razorpay for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the getCouponList() function in all versions up to, and including, 4.7.8. This is due to the checkAuthCredentials() permission callback always returning true, providing no actual authentication. This makes it possible for unauthenticated attackers to modify the billing and shipping contact information (email and phone) of any WooCommerce order by knowing or guessing the order ID.

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactLow
Availability ImpactNone
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$724($500-$1K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Feb 19, 2026

about 2 months ago

Last Modified

Feb 19, 2026

about 2 months ago