Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11271: CWE-807 Reliance on Untrusted Inputs in a Security Decision in smub Easy Digital Downloads – eCommerce Payments and Subscriptions made easy

0
Medium
VulnerabilityCVE-2025-11271cvecve-2025-11271cwe-807
Published: Thu Nov 06 2025 (11/06/2025, 04:36:22 UTC)
Source: CVE Database V5
Vendor/Project: smub
Product: Easy Digital Downloads – eCommerce Payments and Subscriptions made easy

Description

The Easy Digital Downloads plugin for WordPress is vulnerable to Order Manipulation in all versions up to, and including, 3.5.2 due to an order verification bypass. The verification is unconditionally skipped when the POST body includes verification_override=1. Because this value is attacker-supplied, an unauthenticated actor can submit a forged IPN and have it treated as verified, even on production sites and with verification otherwise enabled. A valid PayPal transaction id is needed, restricting order manipulation to orders placed by the attacker. This, in turn, requires them to have a customer account.

AI-Powered Analysis

AILast updated: 11/13/2025, 05:26:47 UTC

Technical Analysis

CVE-2025-11271 identifies a vulnerability in the Easy Digital Downloads plugin for WordPress, specifically affecting all versions up to 3.5.2. The vulnerability is categorized under CWE-807, which involves reliance on untrusted inputs in security decisions. The core issue is that the plugin's order verification process can be bypassed if the POST request includes the parameter verification_override=1. Because this parameter is attacker-supplied and unconditionally accepted, an unauthenticated attacker can submit a forged Instant Payment Notification (IPN) that the system treats as verified, even if verification is enabled. However, exploitation requires the attacker to supply a valid PayPal transaction ID, which restricts manipulation to orders actually placed by the attacker, necessitating a customer account. The vulnerability allows an attacker to manipulate order statuses or details without proper verification, undermining the integrity of the e-commerce transactions. The CVSS v3.1 score is 5.3 (medium severity), reflecting the lack of impact on confidentiality and availability but a clear impact on integrity. No public exploits have been reported yet, and no patches are currently linked, indicating the need for vendor action. The vulnerability affects the e-commerce payment and subscription management functionality, which is critical for online merchants using WordPress with this plugin.

Potential Impact

For European organizations running WordPress sites with the Easy Digital Downloads plugin, this vulnerability poses a risk of fraudulent order manipulation. Attackers with customer accounts can bypass payment verification, potentially leading to unauthorized order status changes or subscription manipulations. This can result in financial losses, accounting discrepancies, and damage to customer trust. While the vulnerability does not expose sensitive data or cause service outages, the integrity compromise can disrupt business operations and complicate transaction reconciliation. E-commerce businesses in Europe, especially SMEs relying on WordPress and Easy Digital Downloads for digital product sales and subscriptions, are vulnerable. The impact is more pronounced for organizations with high transaction volumes or those lacking robust monitoring and fraud detection mechanisms. Additionally, reputational damage from customer disputes or chargebacks could have longer-term business consequences.

Mitigation Recommendations

Immediate mitigation should focus on monitoring and restricting the use of the verification_override parameter in POST requests. Web application firewalls (WAFs) can be configured to block or alert on requests containing verification_override=1. Organizations should enforce strict input validation and logging for all order-related API calls. Until an official patch is released, consider disabling or restricting the Easy Digital Downloads plugin's IPN handling or switching to alternative payment verification methods. Implement multi-factor authentication and strong account security controls to reduce the risk of attacker account creation or compromise. Regularly audit order records for anomalies, such as unexpected status changes or mismatched transaction IDs. Engage with the plugin vendor for timely updates and apply patches promptly once available. Additionally, educate staff on recognizing signs of order manipulation and establish incident response procedures for suspected fraud.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-03T21:53:31.464Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690c27e36cabeda23dacfe93

Added to database: 11/6/2025, 4:45:23 AM

Last enriched: 11/13/2025, 5:26:47 AM

Last updated: 12/21/2025, 7:31:25 AM

Views: 91

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats