Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12621: CWE-863 Incorrect Authorization in wpdesk Flexible Refund and Return Order for WooCommerce

0
Medium
VulnerabilityCVE-2025-12621cvecve-2025-12621cwe-863
Published: Sat Nov 08 2025 (11/08/2025, 07:26:28 UTC)
Source: CVE Database V5
Vendor/Project: wpdesk
Product: Flexible Refund and Return Order for WooCommerce

Description

The Flexible Refund and Return Order for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a misconfigured capability check on the 'create_refund' function in all versions up to, and including, 1.0.42. This makes it possible for authenticated attackers, with Contributor-level access and above, to update the status of refund requests, including approving and refusing refunds.

AI-Powered Analysis

AILast updated: 11/15/2025, 08:15:25 UTC

Technical Analysis

CVE-2025-12621 is an authorization vulnerability classified under CWE-863 found in the Flexible Refund and Return Order for WooCommerce plugin for WordPress. The issue stems from a misconfigured capability check in the 'create_refund' function, which fails to properly restrict access to refund status modifications. This allows authenticated users with Contributor-level privileges or higher to update refund request statuses, including approving or refusing refunds, actions that should be limited to higher-privileged roles such as administrators or shop managers. The vulnerability affects all plugin versions up to and including 1.0.42. The CVSS 3.1 base score is 5.3 (medium), reflecting that the attack vector is network-based and requires authentication but no user interaction. The impact is primarily on data integrity, as unauthorized users can alter refund decisions, potentially leading to financial losses or fraudulent refund processing. There is no impact on confidentiality or availability. No public exploits are currently known, but the vulnerability could be leveraged by malicious insiders or compromised accounts. The plugin is widely used in WooCommerce-based e-commerce sites, which are common in Europe. The flaw highlights the importance of strict capability checks in WordPress plugins managing sensitive business processes such as refunds.

Potential Impact

For European organizations, particularly e-commerce businesses using WooCommerce with the affected plugin, this vulnerability poses a risk of unauthorized refund manipulation. Attackers with Contributor-level access can approve or deny refund requests, potentially causing financial losses, customer dissatisfaction, and reputational damage. Since WooCommerce powers a significant portion of online stores in Europe, the vulnerability could be exploited to commit fraud or disrupt business operations. Although the vulnerability does not expose confidential data or cause service outages, the integrity breach in refund processing workflows can undermine trust and lead to regulatory scrutiny under consumer protection laws. Organizations with less stringent user role management or those allowing Contributor-level access to multiple users are at higher risk. The lack of known exploits reduces immediate threat but does not eliminate the risk of targeted attacks or insider abuse.

Mitigation Recommendations

European organizations should immediately audit user roles and permissions within their WordPress installations, restricting Contributor-level access to trusted users only. Until a patch is released, consider temporarily disabling the Flexible Refund and Return Order for WooCommerce plugin or limiting its usage to administrators and shop managers. Monitor refund request logs for unusual activity or unauthorized status changes. Implement multi-factor authentication to reduce the risk of compromised accounts. Once a security update is available from the vendor, promptly apply it to remediate the vulnerability. Additionally, organizations should review and harden WordPress capability checks and consider deploying web application firewalls (WAFs) with custom rules to detect and block suspicious refund modification attempts. Regular security training for staff managing WordPress roles can help prevent privilege misuse.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-02T17:25:24.607Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690ef21a097c6a910ad5e3e7

Added to database: 11/8/2025, 7:32:42 AM

Last enriched: 11/15/2025, 8:15:25 AM

Last updated: 12/24/2025, 12:40:41 AM

Views: 114

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats