Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12355: CWE-862 Missing Authorization in bigmaster Payaza

0
Medium
VulnerabilityCVE-2025-12355cvecve-2025-12355cwe-862
Published: Fri Dec 05 2025 (12/05/2025, 06:07:19 UTC)
Source: CVE Database V5
Vendor/Project: bigmaster
Product: Payaza

Description

The Payaza plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_nopriv_update_order_status' AJAX endpoint in all versions up to, and including, 0.3.8. This makes it possible for unauthenticated attackers to update order statuses.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 20:22:54 UTC

Technical Analysis

CVE-2025-12355 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Payaza plugin for WordPress, developed by bigmaster. The issue exists in all versions up to and including 0.3.8, where the AJAX endpoint 'wp_ajax_nopriv_update_order_status' lacks a proper capability check. This endpoint is accessible without authentication ('nopriv' indicates no privileges required), allowing any unauthenticated user to send requests that update order statuses arbitrarily. Since order status updates are critical for e-commerce transaction workflows, unauthorized modifications can lead to incorrect order processing, financial discrepancies, and potential customer dissatisfaction. The vulnerability does not expose confidential information nor does it allow denial of service, but it undermines the integrity of order data. The CVSS 3.1 base score is 5.3 (medium), reflecting network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), unchanged scope (S:U), no confidentiality impact (C:N), integrity impact (I:L), and no availability impact (A:N). No patches or known exploits are reported as of the publication date. The vulnerability was reserved on 2025-10-27 and published on 2025-12-05 by Wordfence. Organizations using the Payaza plugin should be aware of this risk and take immediate mitigation steps.

Potential Impact

The primary impact of this vulnerability is the unauthorized modification of order statuses within e-commerce platforms using the Payaza plugin. This can lead to financial inconsistencies, such as marking unpaid orders as completed or shipped, or conversely, blocking legitimate order fulfillment. Such manipulation can disrupt business operations, cause customer trust issues, and complicate auditing processes. Since the vulnerability does not affect confidentiality or availability, data breaches or service outages are unlikely. However, the integrity compromise can have downstream effects on inventory management, accounting, and customer relations. The ease of exploitation without authentication and user interaction increases the risk of automated attacks or mass exploitation attempts. Organizations relying on Payaza for critical order processing are particularly vulnerable to fraud, operational disruption, and reputational damage.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following mitigations: 1) Disable or restrict access to the 'wp_ajax_nopriv_update_order_status' AJAX endpoint via web application firewall (WAF) rules or server configuration to block unauthenticated requests. 2) Implement custom capability checks or authentication mechanisms in the plugin code to ensure only authorized users can update order statuses. 3) Monitor logs for suspicious requests targeting this AJAX endpoint and unusual order status changes. 4) Consider temporarily disabling the Payaza plugin if order status updates are not critical or can be handled manually. 5) Stay updated with vendor advisories and apply patches immediately once available. 6) Conduct thorough testing of order workflows post-mitigation to ensure no legitimate functionality is disrupted. 7) Educate staff to recognize and respond to potential fraudulent order activities resulting from this vulnerability.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-27T15:32:06.345Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69327c01f88dbe026c7c1593

Added to database: 12/5/2025, 6:30:25 AM

Last enriched: 2/27/2026, 8:22:54 PM

Last updated: 3/24/2026, 11:12:58 AM

Views: 111

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses