CVE-2025-12621: CWE-863 Incorrect Authorization in wpdesk Flexible Refund and Return Order for WooCommerce
The Flexible Refund and Return Order for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a misconfigured capability check on the 'create_refund' function in all versions up to, and including, 1.0.42. This makes it possible for authenticated attackers, with Contributor-level access and above, to update the status of refund requests, including approving and refusing refunds.
AI Analysis
Technical Summary
CVE-2025-12621 is an authorization vulnerability classified under CWE-863 found in the Flexible Refund and Return Order for WooCommerce plugin for WordPress. The issue stems from a misconfigured capability check in the 'create_refund' function, which fails to properly restrict access to refund status modifications. This allows authenticated users with Contributor-level privileges or higher to update refund request statuses, including approving or refusing refunds, actions that should be limited to higher-privileged roles such as administrators or shop managers. The vulnerability affects all plugin versions up to and including 1.0.42. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based and requires authentication but no user interaction. The impact is primarily on data integrity, as unauthorized users can alter refund decisions, potentially leading to financial losses or fraudulent refund processing. There is no impact on confidentiality or availability. No public exploits are currently known, but the vulnerability could be leveraged by malicious insiders or compromised accounts. The plugin is widely used in WooCommerce-based e-commerce sites, which are common in Europe. The flaw highlights the importance of strict capability checks in WordPress plugins managing sensitive business processes such as refunds.
Potential Impact
For European organizations, particularly e-commerce businesses using WooCommerce with the affected plugin, this vulnerability poses a risk of unauthorized refund manipulation. Attackers with Contributor-level access can approve or deny refund requests, potentially causing financial losses, customer dissatisfaction, and reputational damage. Since WooCommerce powers a significant portion of online stores in Europe, the vulnerability could be exploited to commit fraud or disrupt business operations. Although the vulnerability does not expose confidential data or cause service outages, the integrity breach in refund processing workflows can undermine trust and lead to regulatory scrutiny under consumer protection laws. Organizations with less stringent user role management or those allowing Contributor-level access to multiple users are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of targeted attacks or insider abuse.
Mitigation Recommendations
European organizations should immediately audit user roles and permissions within their WordPress installations, restricting Contributor-level access to trusted users only. Until a patch is released, consider temporarily disabling the Flexible Refund and Return Order for WooCommerce plugin or limiting its usage to administrators and shop managers. Monitor refund request logs for unusual activity or unauthorized status changes. Implement multi-factor authentication to reduce the risk of compromised accounts. Once a security update is available from the vendor, promptly apply it to remediate the vulnerability. Additionally, organizations should review and harden WordPress capability checks and consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious refund modification attempts. Regular security training for staff managing WordPress roles can help prevent privilege misuse.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-12621: CWE-863 Incorrect Authorization in wpdesk Flexible Refund and Return Order for WooCommerce
Description
The Flexible Refund and Return Order for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a misconfigured capability check on the 'create_refund' function in all versions up to, and including, 1.0.42. This makes it possible for authenticated attackers, with Contributor-level access and above, to update the status of refund requests, including approving and refusing refunds.
AI-Powered Analysis
Technical Analysis
CVE-2025-12621 is an authorization vulnerability classified under CWE-863 found in the Flexible Refund and Return Order for WooCommerce plugin for WordPress. The issue stems from a misconfigured capability check in the 'create_refund' function, which fails to properly restrict access to refund status modifications. This allows authenticated users with Contributor-level privileges or higher to update refund request statuses, including approving or refusing refunds, actions that should be limited to higher-privileged roles such as administrators or shop managers. The vulnerability affects all plugin versions up to and including 1.0.42. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based and requires authentication but no user interaction. The impact is primarily on data integrity, as unauthorized users can alter refund decisions, potentially leading to financial losses or fraudulent refund processing. There is no impact on confidentiality or availability. No public exploits are currently known, but the vulnerability could be leveraged by malicious insiders or compromised accounts. The plugin is widely used in WooCommerce-based e-commerce sites, which are common in Europe. The flaw highlights the importance of strict capability checks in WordPress plugins managing sensitive business processes such as refunds.
Potential Impact
For European organizations, particularly e-commerce businesses using WooCommerce with the affected plugin, this vulnerability poses a risk of unauthorized refund manipulation. Attackers with Contributor-level access can approve or deny refund requests, potentially causing financial losses, customer dissatisfaction, and reputational damage. Since WooCommerce powers a significant portion of online stores in Europe, the vulnerability could be exploited to commit fraud or disrupt business operations. Although the vulnerability does not expose confidential data or cause service outages, the integrity breach in refund processing workflows can undermine trust and lead to regulatory scrutiny under consumer protection laws. Organizations with less stringent user role management or those allowing Contributor-level access to multiple users are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of targeted attacks or insider abuse.
Mitigation Recommendations
European organizations should immediately audit user roles and permissions within their WordPress installations, restricting Contributor-level access to trusted users only. Until a patch is released, consider temporarily disabling the Flexible Refund and Return Order for WooCommerce plugin or limiting its usage to administrators and shop managers. Monitor refund request logs for unusual activity or unauthorized status changes. Implement multi-factor authentication to reduce the risk of compromised accounts. Once a security update is available from the vendor, promptly apply it to remediate the vulnerability. Additionally, organizations should review and harden WordPress capability checks and consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious refund modification attempts. Regular security training for staff managing WordPress roles can help prevent privilege misuse.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-11-02T17:25:24.607Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690ef21a097c6a910ad5e3e7
Added to database: 11/8/2025, 7:32:42 AM
Last enriched: 11/15/2025, 8:15:25 AM
Last updated: 12/24/2025, 12:40:41 AM
Views: 114
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-15048: Command Injection in Tenda WH450
MediumCVE-2025-68696: CWE-918: Server-Side Request Forgery (SSRF) in jnunemaker httparty
HighCVE-2025-68665: CWE-502: Deserialization of Untrusted Data in langchain-ai langchainjs
HighCVE-2025-15049: SQL Injection in code-projects Online Farm System
MediumCVE-2025-68664: CWE-502: Deserialization of Untrusted Data in langchain-ai langchain
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.