CVE-2025-14070: CWE-862 Missing Authorization in xfinitysoft Reviewify — Review Discounts & Photo/Video Reviews for WooCommerce
CVE-2025-14070 is a high-severity vulnerability in the Reviewify WordPress plugin for WooCommerce that allows authenticated users with Contributor-level access or higher to create arbitrary discount coupons due to missing authorization checks on an AJAX action. This flaw can lead to unauthorized financial loss by enabling attackers to generate discounts without proper permissions. The vulnerability affects all versions up to and including 1. 0. 6. Exploitation requires no user interaction beyond authentication, and no privileges beyond Contributor are needed. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and potential impact make it a significant risk for e-commerce sites using this plugin. European organizations running WooCommerce stores with Reviewify installed are at risk, especially in countries with high WooCommerce adoption. Immediate mitigation involves restricting access to the vulnerable AJAX action and updating or patching the plugin once available. Monitoring for suspicious coupon creation and limiting Contributor roles can reduce exposure.
AI Analysis
Technical Summary
The CVE-2025-14070 vulnerability is a missing authorization (CWE-862) flaw in the Reviewify plugin for WordPress, which integrates with WooCommerce to provide review-based discounts and media uploads. The vulnerability arises because the 'send_test_email' AJAX action lacks proper capability checks, allowing any authenticated user with Contributor-level permissions or higher to invoke this action without restriction. Since Contributors can normally submit content but not manage coupons, this missing check escalates their privileges, enabling them to create arbitrary discount coupons in WooCommerce. These coupons can be used to reduce prices fraudulently, causing direct financial losses to the store owners. The vulnerability affects all versions up to 1.0.6 of Reviewify. The CVSS 3.1 score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required beyond Contributor, no user interaction, and high impact on integrity (unauthorized coupon creation). The flaw does not impact confidentiality or availability directly but compromises the integrity of the e-commerce pricing and discount system. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in December 2025 and published in January 2026. Given the widespread use of WooCommerce and the popularity of review-based discount plugins, this vulnerability poses a significant risk to online stores using Reviewify.
Potential Impact
For European organizations operating WooCommerce-based e-commerce platforms, this vulnerability can lead to unauthorized financial losses through fraudulent coupon creation. Attackers with Contributor-level access—often granted to content creators or less-privileged users—can exploit this flaw to generate arbitrary discounts, undermining revenue and potentially damaging customer trust. The integrity of pricing and promotional mechanisms is compromised, which can also affect accounting and inventory management systems. Retailers in Europe relying on Reviewify for incentivizing reviews may face direct monetary losses and reputational damage. Additionally, if exploited at scale, it could disrupt promotional campaigns and lead to increased operational costs due to the need for manual review and remediation. The vulnerability does not directly expose customer data but could indirectly affect customer experience and trust. European GDPR regulations emphasize data integrity and security, so exploitation might also raise compliance concerns if financial fraud impacts customer transactions or data.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the 'send_test_email' AJAX action by implementing proper capability checks to ensure only authorized roles (e.g., administrators) can invoke it. Store administrators should audit user roles and permissions, limiting Contributor-level access strictly to trusted users. Monitoring WooCommerce coupon creation logs for unusual or unexpected coupons can help detect exploitation attempts early. Until an official patch is released by xfinitysoft, consider disabling the Reviewify plugin or replacing it with alternative review discount plugins that have proper authorization controls. Applying a Web Application Firewall (WAF) with custom rules to block unauthorized AJAX requests targeting this action can provide temporary protection. Regularly update WordPress, WooCommerce, and all plugins to their latest versions once patches become available. Educate content contributors about the risk and encourage reporting of suspicious activity. Finally, implement multi-factor authentication (MFA) for all user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14070: CWE-862 Missing Authorization in xfinitysoft Reviewify — Review Discounts & Photo/Video Reviews for WooCommerce
Description
CVE-2025-14070 is a high-severity vulnerability in the Reviewify WordPress plugin for WooCommerce that allows authenticated users with Contributor-level access or higher to create arbitrary discount coupons due to missing authorization checks on an AJAX action. This flaw can lead to unauthorized financial loss by enabling attackers to generate discounts without proper permissions. The vulnerability affects all versions up to and including 1. 0. 6. Exploitation requires no user interaction beyond authentication, and no privileges beyond Contributor are needed. Although no known exploits are currently reported in the wild, the vulnerability's ease of exploitation and potential impact make it a significant risk for e-commerce sites using this plugin. European organizations running WooCommerce stores with Reviewify installed are at risk, especially in countries with high WooCommerce adoption. Immediate mitigation involves restricting access to the vulnerable AJAX action and updating or patching the plugin once available. Monitoring for suspicious coupon creation and limiting Contributor roles can reduce exposure.
AI-Powered Analysis
Technical Analysis
The CVE-2025-14070 vulnerability is a missing authorization (CWE-862) flaw in the Reviewify plugin for WordPress, which integrates with WooCommerce to provide review-based discounts and media uploads. The vulnerability arises because the 'send_test_email' AJAX action lacks proper capability checks, allowing any authenticated user with Contributor-level permissions or higher to invoke this action without restriction. Since Contributors can normally submit content but not manage coupons, this missing check escalates their privileges, enabling them to create arbitrary discount coupons in WooCommerce. These coupons can be used to reduce prices fraudulently, causing direct financial losses to the store owners. The vulnerability affects all versions up to 1.0.6 of Reviewify. The CVSS 3.1 score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required beyond Contributor, no user interaction, and high impact on integrity (unauthorized coupon creation). The flaw does not impact confidentiality or availability directly but compromises the integrity of the e-commerce pricing and discount system. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability was reserved in December 2025 and published in January 2026. Given the widespread use of WooCommerce and the popularity of review-based discount plugins, this vulnerability poses a significant risk to online stores using Reviewify.
Potential Impact
For European organizations operating WooCommerce-based e-commerce platforms, this vulnerability can lead to unauthorized financial losses through fraudulent coupon creation. Attackers with Contributor-level access—often granted to content creators or less-privileged users—can exploit this flaw to generate arbitrary discounts, undermining revenue and potentially damaging customer trust. The integrity of pricing and promotional mechanisms is compromised, which can also affect accounting and inventory management systems. Retailers in Europe relying on Reviewify for incentivizing reviews may face direct monetary losses and reputational damage. Additionally, if exploited at scale, it could disrupt promotional campaigns and lead to increased operational costs due to the need for manual review and remediation. The vulnerability does not directly expose customer data but could indirectly affect customer experience and trust. European GDPR regulations emphasize data integrity and security, so exploitation might also raise compliance concerns if financial fraud impacts customer transactions or data.
Mitigation Recommendations
Immediate mitigation steps include restricting access to the 'send_test_email' AJAX action by implementing proper capability checks to ensure only authorized roles (e.g., administrators) can invoke it. Store administrators should audit user roles and permissions, limiting Contributor-level access strictly to trusted users. Monitoring WooCommerce coupon creation logs for unusual or unexpected coupons can help detect exploitation attempts early. Until an official patch is released by xfinitysoft, consider disabling the Reviewify plugin or replacing it with alternative review discount plugins that have proper authorization controls. Applying a Web Application Firewall (WAF) with custom rules to block unauthorized AJAX requests targeting this action can provide temporary protection. Regularly update WordPress, WooCommerce, and all plugins to their latest versions once patches become available. Educate content contributors about the risk and encourage reporting of suspicious activity. Finally, implement multi-factor authentication (MFA) for all user accounts to reduce the risk of compromised credentials being used to exploit this vulnerability.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-04T21:14:37.597Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c137349d0379d7d5780
Added to database: 1/7/2026, 12:05:39 PM
Last enriched: 1/14/2026, 3:59:19 PM
Last updated: 2/4/2026, 6:58:09 PM
Views: 39
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0536: CWE-787 Out-of-bounds Write in Autodesk 3ds Max
HighCVE-2024-42642: n/a
CriticalCVE-2026-25532: CWE-191: Integer Underflow (Wrap or Wraparound) in espressif esp-idf
MediumCVE-2026-25508: CWE-125: Out-of-bounds Read in espressif esp-idf
MediumCVE-2026-25507: CWE-416: Use After Free in espressif esp-idf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.