Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14070: CWE-862 Missing Authorization in xfinitysoft Reviewify — Review Discounts & Photo/Video Reviews for WooCommerce

0
High
VulnerabilityCVE-2025-14070cvecve-2025-14070cwe-862
Published: Wed Jan 07 2026 (01/07/2026, 09:21:01 UTC)
Source: CVE Database V5
Vendor/Project: xfinitysoft
Product: Reviewify — Review Discounts & Photo/Video Reviews for WooCommerce

Description

The Reviewify plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'send_test_email' AJAX action in all versions up to, and including, 1.0.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to create arbitrary WooCommerce discount coupons, potentially causing financial loss to the store.

AI-Powered Analysis

AILast updated: 01/07/2026, 12:11:29 UTC

Technical Analysis

The CVE-2025-14070 vulnerability resides in the Reviewify plugin for WooCommerce, a WordPress extension that facilitates review-based discounts and media reviews. The core issue is a missing authorization check on the 'send_test_email' AJAX action, which is accessible to authenticated users with Contributor-level privileges or higher. This missing capability check (CWE-862) allows these users to invoke the AJAX action to create arbitrary discount coupons without proper permissions. Since Contributors typically cannot manage coupons, this represents a privilege escalation within the plugin's context. The vulnerability affects all versions up to and including 1.0.6. Exploitation requires no user interaction beyond logging in with a Contributor or higher account, and the attack can be performed remotely over the network. The impact is primarily on integrity, as attackers can manipulate coupon data to cause unauthorized financial discounts, potentially leading to revenue loss for WooCommerce store owners. The CVSS 3.1 score of 7.5 (High) reflects the network attack vector, low attack complexity, no privileges required beyond Contributor access, no user interaction, and a significant integrity impact. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. However, the vulnerability's nature suggests it could be exploited by malicious insiders or compromised accounts to generate fraudulent discounts.

Potential Impact

For European organizations operating WooCommerce-based e-commerce platforms with the Reviewify plugin installed, this vulnerability poses a significant risk of financial loss through unauthorized coupon creation. Attackers with low-level authenticated access can generate arbitrary discounts, undermining revenue and potentially damaging customer trust if exploited at scale. The integrity of pricing and discount mechanisms is compromised, which could also affect accounting and inventory management systems connected to WooCommerce. Additionally, exploitation could facilitate further attacks by incentivizing fraudulent purchases or enabling social engineering scams using manipulated discounts. Given the widespread use of WordPress and WooCommerce in Europe, especially in countries with mature e-commerce markets, the threat could impact a broad range of small to medium-sized enterprises reliant on online sales. The absence of user interaction and the low privilege requirement increase the likelihood of exploitation once attackers gain Contributor-level access, which can be obtained through phishing or other credential compromise methods.

Mitigation Recommendations

1. Immediately restrict Contributor and other low-privilege user roles from accessing or interacting with the Reviewify plugin functionalities until a patch is available. 2. Monitor and audit coupon creation logs within WooCommerce to detect unusual or unauthorized discount generation activities. 3. Implement strict role-based access control (RBAC) policies, ensuring that only trusted users have Contributor or higher roles. 4. Employ multi-factor authentication (MFA) for all WordPress user accounts to reduce the risk of account compromise. 5. Regularly update the Reviewify plugin as soon as the vendor releases a patch addressing this vulnerability. 6. Consider temporarily disabling the Reviewify plugin if it is not critical to business operations until a fix is applied. 7. Use web application firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the 'send_test_email' action. 8. Educate staff on phishing and credential security to prevent unauthorized access to Contributor accounts. 9. Review and tighten WordPress security configurations, including limiting plugin installation and updates to administrators only.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-04T21:14:37.597Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e4c137349d0379d7d5780

Added to database: 1/7/2026, 12:05:39 PM

Last enriched: 1/7/2026, 12:11:29 PM

Last updated: 1/9/2026, 2:01:20 AM

Views: 12

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats