CVE-2025-14294
Plain English Summary
AI-powered analysis for quick understanding
Attackers can change the billing and shipping contact information, like email and phone numbers, for any WooCommerce order just by knowing or guessing the order ID. This vulnerability exists because the plugin doesn't properly check if the attacker is authorized, allowing anyone to make these changes without needing to log in.
Technical Description
The Razorpay for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the getCouponList() function in all versions up to, and including, 4.7.8. This is due to the checkAuthCredentials() permission callback always returning true, providing no actual authentication. This makes it possible for unauthenticated attackers to modify the billing and shipping contact information (email and phone) of any WooCommerce order by knowing or guessing the order ID.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:NExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 19, 2026
about 2 months ago
Last Modified
Feb 19, 2026
about 2 months ago