CVE-2024-12265: CWE-862 Missing Authorization in depayfi Web3 Crypto Payments by DePay for WooCommerce
CVE-2024-12265 is a medium severity vulnerability in the Web3 Crypto Payments by DePay plugin for WooCommerce that allows unauthenticated attackers to access debug information via the /wp-json/depay/wc/debug REST API endpoint. The root cause is a missing authorization check (CWE-862) on this endpoint in all versions up to 2. 12. 17. Exploitation requires no authentication or user interaction and can lead to unauthorized disclosure of potentially sensitive debug data. Although no known exploits are currently reported in the wild, the vulnerability could aid attackers in reconnaissance or further attacks. The CVSS score is 5. 3, reflecting limited confidentiality impact and no integrity or availability impact. Organizations using this plugin should prioritize patching or mitigating access to the vulnerable endpoint. Countries with significant WooCommerce and WordPress usage, especially those with active Web3 and crypto commerce sectors, are most at risk.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2024-12265 affects the Web3 Crypto Payments by DePay plugin for WooCommerce, a WordPress plugin facilitating cryptocurrency payments. The issue arises from a missing authorization check (CWE-862) on the REST API endpoint /wp-json/depay/wc/debug, which is intended for debugging purposes. This endpoint does not verify whether the requester has the necessary permissions, allowing any unauthenticated user to retrieve debug information. The plugin versions up to and including 2.12.17 are affected. The debug data exposed could include sensitive internal state or configuration details that may assist attackers in further exploitation or reconnaissance activities. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality only (C:L), without affecting integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was publicly disclosed on December 12, 2024, and assigned by Wordfence. Given the plugin’s role in handling crypto payments, unauthorized access to debug information could expose implementation details or sensitive operational data, increasing the risk of targeted attacks.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of debug information, which could include sensitive configuration details, API keys, or internal logic related to cryptocurrency payment processing. While the vulnerability does not directly compromise data integrity or availability, the leaked information could facilitate further attacks such as targeted phishing, exploitation of other vulnerabilities, or unauthorized transactions. Organizations using the affected plugin may face increased risk of data exposure and potential reputational damage. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely by any attacker scanning for vulnerable endpoints. This increases the attack surface for WooCommerce sites using this plugin, especially those handling significant volumes of crypto transactions. The medium severity rating reflects the limited direct impact but acknowledges the potential for indirect consequences through information leakage.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict access to the /wp-json/depay/wc/debug REST API endpoint. This can be achieved by implementing web application firewall (WAF) rules to block unauthenticated requests to this endpoint or by configuring server-level access controls to limit access to trusted IP addresses only. Additionally, administrators should monitor web server logs for suspicious access attempts to this endpoint. Since no official patch is currently available, disabling or removing the debug endpoint if possible is recommended. Organizations should also ensure that the plugin is updated promptly once a patch is released by the vendor. As a best practice, debug endpoints should never be exposed publicly in production environments. Conducting a thorough security review of all REST API endpoints in the WordPress environment to verify proper authorization checks is advisable. Finally, educating site administrators on the risks of exposing debug information and enforcing the principle of least privilege for API access will reduce future risk.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Netherlands, France, Japan, South Korea, Singapore
CVE-2024-12265: CWE-862 Missing Authorization in depayfi Web3 Crypto Payments by DePay for WooCommerce
Description
CVE-2024-12265 is a medium severity vulnerability in the Web3 Crypto Payments by DePay plugin for WooCommerce that allows unauthenticated attackers to access debug information via the /wp-json/depay/wc/debug REST API endpoint. The root cause is a missing authorization check (CWE-862) on this endpoint in all versions up to 2. 12. 17. Exploitation requires no authentication or user interaction and can lead to unauthorized disclosure of potentially sensitive debug data. Although no known exploits are currently reported in the wild, the vulnerability could aid attackers in reconnaissance or further attacks. The CVSS score is 5. 3, reflecting limited confidentiality impact and no integrity or availability impact. Organizations using this plugin should prioritize patching or mitigating access to the vulnerable endpoint. Countries with significant WooCommerce and WordPress usage, especially those with active Web3 and crypto commerce sectors, are most at risk.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2024-12265 affects the Web3 Crypto Payments by DePay plugin for WooCommerce, a WordPress plugin facilitating cryptocurrency payments. The issue arises from a missing authorization check (CWE-862) on the REST API endpoint /wp-json/depay/wc/debug, which is intended for debugging purposes. This endpoint does not verify whether the requester has the necessary permissions, allowing any unauthenticated user to retrieve debug information. The plugin versions up to and including 2.12.17 are affected. The debug data exposed could include sensitive internal state or configuration details that may assist attackers in further exploitation or reconnaissance activities. The vulnerability has a CVSS 3.1 base score of 5.3, indicating a medium severity level. The attack vector is network-based (AV:N), requires no privileges (PR:N), no user interaction (UI:N), and impacts confidentiality only (C:L), without affecting integrity or availability. No patches or fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was publicly disclosed on December 12, 2024, and assigned by Wordfence. Given the plugin’s role in handling crypto payments, unauthorized access to debug information could expose implementation details or sensitive operational data, increasing the risk of targeted attacks.
Potential Impact
The primary impact of this vulnerability is unauthorized disclosure of debug information, which could include sensitive configuration details, API keys, or internal logic related to cryptocurrency payment processing. While the vulnerability does not directly compromise data integrity or availability, the leaked information could facilitate further attacks such as targeted phishing, exploitation of other vulnerabilities, or unauthorized transactions. Organizations using the affected plugin may face increased risk of data exposure and potential reputational damage. Since the vulnerability requires no authentication and no user interaction, it can be exploited remotely by any attacker scanning for vulnerable endpoints. This increases the attack surface for WooCommerce sites using this plugin, especially those handling significant volumes of crypto transactions. The medium severity rating reflects the limited direct impact but acknowledges the potential for indirect consequences through information leakage.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately restrict access to the /wp-json/depay/wc/debug REST API endpoint. This can be achieved by implementing web application firewall (WAF) rules to block unauthenticated requests to this endpoint or by configuring server-level access controls to limit access to trusted IP addresses only. Additionally, administrators should monitor web server logs for suspicious access attempts to this endpoint. Since no official patch is currently available, disabling or removing the debug endpoint if possible is recommended. Organizations should also ensure that the plugin is updated promptly once a patch is released by the vendor. As a best practice, debug endpoints should never be exposed publicly in production environments. Conducting a thorough security review of all REST API endpoints in the WordPress environment to verify proper authorization checks is advisable. Finally, educating site administrators on the risks of exposing debug information and enforcing the principle of least privilege for API access will reduce future risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2024-12-05T16:56:27.661Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699f6e33b7ef31ef0b597b01
Added to database: 2/25/2026, 9:48:35 PM
Last enriched: 2/26/2026, 5:44:26 AM
Last updated: 2/26/2026, 6:14:20 AM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-25191: Uncontrolled Search Path Element in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-23703: Incorrect default permissions in Digital Arts Inc. FinalCode Ver.5 series
HighCVE-2026-1311: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in bearsthemes Worry Proof Backup
HighFinding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)
MediumCVE-2026-2506: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in motahar1 EM Cost Calculator
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.