Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-13692: CWE-285 Improper Authorization in wpswings Return Refund and Exchange For WooCommerce – Return Management System, RMA Exchange, Wallet And Cancel Order Features

0
Medium
VulnerabilityCVE-2024-13692cvecve-2024-13692cwe-285
Published: Fri Feb 14 2025 (02/14/2025, 05:22:44 UTC)
Source: CVE Database V5
Vendor/Project: wpswings
Product: Return Refund and Exchange For WooCommerce – Return Management System, RMA Exchange, Wallet And Cancel Order Features

Description

CVE-2024-13692 is a medium severity vulnerability affecting the WordPress plugin 'Return Refund and Exchange For WooCommerce – Return Management System, RMA Exchange, Wallet And Cancel Order Features' up to version 4. 4. 5. It is caused by improper authorization (CWE-285) leading to Insecure Direct Object Reference (IDOR) due to missing validation on a user-controlled key. This flaw allows attackers with limited privileges to overwrite refund image attachments, refund request messages, order messages, and read order messages belonging to other users without authentication. The vulnerability does not require user interaction and can be exploited remotely over the network. Although no known exploits are currently reported in the wild, the vulnerability poses risks to the confidentiality and integrity of order and refund data. Organizations using this plugin should prioritize patching or applying mitigations to prevent unauthorized data manipulation and disclosure.

AI-Powered Analysis

AILast updated: 02/25/2026, 22:46:43 UTC

Technical Analysis

CVE-2024-13692 is an authorization bypass vulnerability classified under CWE-285 affecting the 'Return Refund and Exchange For WooCommerce – Return Management System, RMA Exchange, Wallet And Cancel Order Features' WordPress plugin developed by wpswings. The vulnerability exists in all versions up to and including 4.4.5 due to missing validation on a user-controlled key parameter in several plugin functions. This lack of proper authorization checks leads to an Insecure Direct Object Reference (IDOR) condition, allowing attackers to access and modify resources belonging to other users. Specifically, unauthenticated attackers can overwrite linked refund image attachments, refund request messages, and order messages, as well as read order messages of other users. The vulnerability is remotely exploitable without user interaction and requires only low privileges (PR:L) but no authentication (AV:N). The CVSS v3.1 base score is 5.4 (medium severity), reflecting limited impact on confidentiality and integrity but no impact on availability. The flaw compromises the integrity and confidentiality of sensitive order and refund data, potentially leading to fraudulent refund requests, data leakage, and undermining customer trust. No patches or known exploits have been reported at the time of publication, but the plugin’s widespread use in WooCommerce environments makes it a notable risk.

Potential Impact

The vulnerability can lead to unauthorized disclosure and modification of sensitive order and refund information within WooCommerce stores using the affected plugin. Attackers could manipulate refund requests, alter refund-related images, and tamper with order messages, potentially facilitating fraudulent refund claims or misleading customer communications. This undermines data integrity and confidentiality, which can damage customer trust and lead to financial losses. The lack of authentication requirement and remote exploitability increase the risk of automated attacks targeting vulnerable WooCommerce sites globally. While availability is not impacted, the integrity and confidentiality breaches could have reputational and operational consequences for e-commerce businesses relying on this plugin. Organizations may face compliance issues if customer data is exposed or manipulated without authorization.

Mitigation Recommendations

1. Immediately update the 'Return Refund and Exchange For WooCommerce' plugin to the latest version once a patch is released by wpswings. 2. Until a patch is available, restrict access to the plugin’s refund and order management endpoints using web application firewall (WAF) rules or IP whitelisting to limit exposure. 3. Implement strict access controls and role-based permissions within WooCommerce to minimize the number of users with refund and order modification privileges. 4. Monitor logs for unusual activities related to refund requests and order message changes to detect potential exploitation attempts. 5. Consider disabling or limiting the use of refund image attachments and refund message features if not critical to business operations. 6. Conduct regular security audits of WordPress plugins and maintain an inventory to quickly identify and remediate vulnerable components. 7. Educate staff on recognizing fraudulent refund requests and suspicious order modifications to reduce impact from potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-01-23T20:27:10.879Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6e68b7ef31ef0b5a018a

Added to database: 2/25/2026, 9:49:28 PM

Last enriched: 2/25/2026, 10:46:43 PM

Last updated: 2/26/2026, 7:44:07 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats