Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-12903: CWE-639 Authorization Bypass Through User-Controlled Key in mrclayton Payment Plugins Braintree For WooCommerce

0
High
VulnerabilityCVE-2025-12903cvecve-2025-12903cwe-639
Published: Wed Nov 12 2025 (11/12/2025, 08:28:04 UTC)
Source: CVE Database V5
Vendor/Project: mrclayton
Product: Payment Plugins Braintree For WooCommerce

Description

The Payment Plugins Braintree For WooCommerce plugin for WordPress is vulnerable to authorization bypass due to a missing capability check on the wc-braintree/v1/3ds/vaulted_nonce REST API endpoint in all versions up to, and including, 3.2.78. This is due to the endpoint being registered with permission_callback set to __return_true and processing user-supplied token IDs without verifying ownership or authentication. This makes it possible for unauthenticated attackers to retrieve payment method nonces for any stored payment token in the system, which can be used to create fraudulent transactions, charge customer credit cards, or attach payment methods to other subscriptions.

AI-Powered Analysis

AILast updated: 11/19/2025, 11:15:13 UTC

Technical Analysis

CVE-2025-12903 is an authorization bypass vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) affecting the Payment Plugins Braintree For WooCommerce plugin for WordPress. The vulnerability arises because the REST API endpoint wc-braintree/v1/3ds/vaulted_nonce is registered with a permission callback that always returns true (__return_true), effectively disabling any authentication or capability checks. This endpoint processes user-supplied token IDs without verifying whether the requester owns the token or is authenticated. As a result, an unauthenticated attacker can supply arbitrary token IDs and retrieve corresponding payment method nonces. These nonces are sensitive tokens used to authorize payment transactions. By obtaining them, attackers can create fraudulent charges on customers’ credit cards or attach stolen payment methods to other subscriptions, leading to financial fraud. The vulnerability affects all plugin versions up to 3.2.78 and can be exploited remotely without any user interaction or privileges. The CVSS v3.1 base score is 7.5 (high), with vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N, indicating network attack vector, low attack complexity, no privileges or user interaction required, and high confidentiality impact. Although no public exploits have been reported yet, the flaw’s nature and ease of exploitation make it a critical risk for e-commerce sites using this plugin. The lack of patch links suggests a fix may not yet be available, emphasizing the need for immediate mitigation.

Potential Impact

For European organizations operating WooCommerce-based e-commerce platforms with the vulnerable Braintree payment plugin, this vulnerability poses a significant risk of financial fraud. Attackers can exploit the flaw to retrieve payment method nonces without authentication, enabling unauthorized transactions and fraudulent charges on customers’ credit cards. This can lead to direct financial losses, chargebacks, and damage to customer trust. Additionally, fraudulent subscription attachments can cause ongoing financial harm and complicate billing reconciliation. The breach of payment data confidentiality can also trigger regulatory consequences under GDPR, including fines and mandatory breach notifications. The reputational damage from such incidents can be severe, especially for businesses relying heavily on online payments. Since WooCommerce is widely used across Europe, especially in countries with strong e-commerce markets like Germany, the UK, France, and the Netherlands, the potential impact is broad. The vulnerability’s exploitation could disrupt business operations, increase fraud-related costs, and erode consumer confidence in affected merchants.

Mitigation Recommendations

Immediate mitigation steps include disabling or restricting access to the vulnerable REST API endpoint wc-braintree/v1/3ds/vaulted_nonce until a patch is available. Organizations should implement custom permission callbacks that verify user authentication and ownership of payment tokens before processing requests. Applying web application firewall (WAF) rules to block suspicious requests targeting this endpoint can reduce exposure. Monitoring logs for unusual API access patterns or repeated requests to this endpoint can help detect exploitation attempts. Merchants should review and audit stored payment tokens and transactions for signs of fraudulent activity. If possible, temporarily disabling the Braintree payment plugin or switching to alternative payment methods can reduce risk. Organizations should stay alert for official patches or updates from the plugin vendor and apply them promptly once released. Additionally, educating development and security teams about the risks of improper authorization checks in REST APIs can prevent similar issues in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-11-07T20:09:44.746Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6914483ad823118ac8c87d36

Added to database: 11/12/2025, 8:41:30 AM

Last enriched: 11/19/2025, 11:15:13 AM

Last updated: 2/7/2026, 9:50:39 AM

Views: 155

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats