Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-12265: CWE-862 Missing Authorization in depayfi Web3 Crypto Payments by DePay for WooCommerce

0
Medium
VulnerabilityCVE-2024-12265cvecve-2024-12265cwe-862
Published: Thu Dec 12 2024 (12/12/2024, 05:24:24 UTC)
Source: CVE Database V5
Vendor/Project: depayfi
Product: Web3 Crypto Payments by DePay for WooCommerce

Description

CVE-2024-12265 is a medium severity vulnerability in the Web3 Crypto Payments by DePay plugin for WooCommerce that allows unauthenticated attackers to access debug information via the /wp-json/depay/wc/debug REST API endpoint. The root cause is a missing authorization check (CWE-862) on this endpoint in all versions up to 2. 12. 17. Exploitation requires no authentication or user interaction and can lead to unauthorized disclosure of potentially sensitive debug data. Although no known exploits are currently reported in the wild, the vulnerability could aid attackers in reconnaissance or further attacks. The CVSS score is 5. 3, reflecting limited confidentiality impact and no integrity or availability impact. Organizations using this plugin should prioritize patching or mitigating access to the vulnerable endpoint. Countries with significant WooCommerce and WordPress usage, especially those with active Web3 and crypto commerce sectors, are most at risk.

AI-Powered Analysis

AILast updated: 02/26/2026, 05:44:26 UTC

Technical Analysis

The vulnerability identified as CVE-2024-12265 affects the Web3 Crypto Payments by DePay plugin for WooCommerce, a WordPress plugin facilitating cryptocurrency payments. The issue arises from a missing authorization check (CWE-862) on the REST API endpoint /wp-json/depay/wc/debug, which is intended for debugging purposes. This endpoint does not verify whether the requester has the necessary permissions, allowing any unauthenticated user to retrieve debug information. The plugin versions up to and including 2.12.17 are affected. The debug data exposed could include sensitive internal state or configuration details that may assist attackers in further exploitation or reconnaissance activities. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality only (C:L), without affecting integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was publicly disclosed on December 12, 2024, and assigned by Wordfence. Given the plugin’s role in handling crypto payments, unauthorized access to debug information could expose implementation details or sensitive operational data, increasing the risk of targeted attacks.

Potential Impact

The primary impact of this vulnerability is unauthorized disclosure of debug information, which could include sensitive configuration details, API keys, or internal logic related to cryptocurrency payment processing. While the vulnerability does not directly compromise data integrity or availability, the leaked information could facilitate further attacks such as targeted phishing, exploitation of other vulnerabilities, or unauthorized transactions. Organizations using the affected plugin may face increased risk of data exposure and potential reputational damage. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely by any attacker scanning for vulnerable endpoints. This increases the attack surface for WooCommerce sites using this plugin, especially those handling significant volumes of crypto transactions. The medium severity rating reflects the limited direct impact but acknowledges the potential for indirect consequences through information leakage.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately restrict access to the /wp-json/depay/wc/debug REST API endpoint. This can be achieved by implementing web application firewall (WAF) rules to block unauthenticated requests to this endpoint or by configuring server-level access controls to limit access to trusted IP addresses only. Additionally, administrators should monitor web server logs for suspicious access attempts to this endpoint. Since no official patch is currently available, disabling or removing the debug endpoint if possible is recommended. Organizations should also ensure that the plugin is updated promptly once a patch is released by the vendor. As a best practice, debug endpoints should never be exposed publicly in production environments. Conducting a thorough security review of all REST API endpoints in the WordPress environment to verify proper authorization checks is advisable. Finally, educating site administrators on the risks of exposing debug information and enforcing the principle of least privilege for API access will reduce future risk.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2024-12-05T16:56:27.661Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e33b7ef31ef0b597b01

Added to database: 2/25/2026, 9:48:35 PM

Last enriched: 2/26/2026, 5:44:26 AM

Last updated: 2/26/2026, 6:14:20 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats