Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-10570: CWE-639 Authorization Bypass Through User-Controlled Key in wpdesk Flexible Refund and Return Order for WooCommerce

0
Medium
VulnerabilityCVE-2025-10570cvecve-2025-10570cwe-639
Published: Wed Oct 22 2025 (10/22/2025, 06:40:59 UTC)
Source: CVE Database V5
Vendor/Project: wpdesk
Product: Flexible Refund and Return Order for WooCommerce

Description

The Flexible Refund and Return Order for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 1.0.38 via the save_refund_request() function. This makes it possible for authenticated attackers, with subscriber-level access and above, to submit refund requests for arbitrary orders that they do not own.

AI-Powered Analysis

AILast updated: 10/29/2025, 07:07:31 UTC

Technical Analysis

The vulnerability identified as CVE-2025-10570 affects the Flexible Refund and Return Order for WooCommerce plugin for WordPress, specifically all versions up to and including 1.0.38. The core issue is a Missing Authorization vulnerability (CWE-639) in the save_refund_request() function. This function fails to verify whether the authenticated user submitting a refund request actually owns the order in question. As a result, any user with subscriber-level access or higher can submit refund requests for arbitrary orders, bypassing intended authorization controls. The vulnerability is exploitable remotely over the network without requiring user interaction, and the attacker needs only low privileges (subscriber role) to exploit it. The CVSS 3.1 base score is 4.3 (medium severity), reflecting that the impact is limited to integrity (unauthorized refund requests) without affecting confidentiality or availability. No known exploits are currently in the wild, and no official patches have been published as of the vulnerability disclosure date (October 22, 2025). The flaw could be leveraged by malicious insiders or compromised accounts to fraudulently request refunds, potentially causing financial loss and undermining trust in e-commerce operations. The vulnerability highlights the importance of proper authorization checks in WordPress plugins handling sensitive e-commerce functions.

Potential Impact

For European organizations operating WooCommerce-based e-commerce platforms using the vulnerable Flexible Refund and Return Order plugin, this vulnerability poses a risk of unauthorized refund requests. While it does not expose sensitive customer data or disrupt service availability, it can lead to financial losses through fraudulent refunds and damage customer trust. The integrity of order management processes is compromised, potentially affecting accounting and reconciliation. Attackers with subscriber-level access, which is a common default role for registered users, can exploit this flaw, increasing the attack surface. This is particularly concerning for large-scale e-commerce businesses and marketplaces in Europe where WooCommerce is widely adopted. The impact is amplified in sectors with high transaction volumes or where refund fraud can cause significant financial damage. Additionally, regulatory compliance such as GDPR may be indirectly impacted if fraudulent activities lead to customer disputes or data handling issues.

Mitigation Recommendations

To mitigate this vulnerability, European organizations should immediately audit user roles and permissions within their WordPress installations to ensure that subscriber-level users have minimal privileges and cannot access refund functionalities. Implement additional authorization checks at the application level to verify order ownership before processing refund requests. Consider temporarily disabling the Flexible Refund and Return Order plugin if refund functionality is not critical or if no immediate patch is available. Monitor logs and refund request patterns for anomalies indicative of abuse, such as multiple refund requests from low-privilege accounts. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious refund request submissions. Stay informed about official patches or updates from the plugin vendor and apply them promptly once released. For long-term security, consider adopting plugins with robust security reviews and active maintenance. Finally, educate staff and users about the risks of account compromise and enforce strong authentication measures to reduce the risk of attacker access.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-09-16T16:19:08.622Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f87dba01fe9fee6c20e446

Added to database: 10/22/2025, 6:46:18 AM

Last enriched: 10/29/2025, 7:07:31 AM

Last updated: 10/30/2025, 12:40:07 PM

Views: 94

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats