CVE-2025-14070: CWE-862 Missing Authorization in xfinitysoft Reviewify — Review Discounts & Photo/Video Reviews for WooCommerce
The Reviewify plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'send_test_email' AJAX action in all versions up to, and including, 1.0.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to create arbitrary WooCommerce discount coupons, potentially causing financial loss to the store.
AI Analysis
Technical Summary
CVE-2025-14070 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Reviewify — Review Discounts & Photo/Video Reviews plugin for WooCommerce on WordPress. The root cause is the absence of a capability check on the 'send_test_email' AJAX action, which is accessible to authenticated users with Contributor-level permissions or higher. This flaw enables such users to create arbitrary WooCommerce discount coupons without proper authorization. Since WooCommerce coupons can directly impact store revenue by providing discounts, unauthorized creation can lead to financial losses and potential abuse of promotional offers. The vulnerability affects all versions up to 1.0.6 inclusive. The CVSS v3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required beyond Contributor, no user interaction, and a significant impact on integrity but no impact on confidentiality or availability. The vulnerability was reserved in December 2025 and published in January 2026. No patches or known exploits are currently available, but the issue is publicly disclosed, increasing the risk of exploitation. The flaw is particularly concerning in environments where multiple users have Contributor or higher roles, such as multi-author blogs or stores with delegated content management.
Potential Impact
The primary impact of this vulnerability is unauthorized modification of WooCommerce store data, specifically the creation of arbitrary discount coupons. This can lead to direct financial losses due to unauthorized discounts being applied to purchases. Additionally, it can undermine customer trust if fraudulent discounts are exploited or if the store's promotional integrity is compromised. The vulnerability does not affect confidentiality or availability but severely impacts data integrity. Attackers with Contributor-level access, which is a relatively low privilege level, can exploit this flaw without requiring administrator rights or user interaction, increasing the risk in environments with multiple authenticated users. This can also facilitate further attacks by incentivizing fraudulent purchases or coupon abuse. Organizations relying on the affected plugin risk revenue loss, reputational damage, and potential operational disruptions due to the need for incident response and remediation.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Reviewify plugin to a patched version once available from the vendor. Until a patch is released, administrators should restrict Contributor-level access and above to trusted users only, minimizing the risk of exploitation. Implementing strict role-based access controls and auditing user permissions can reduce exposure. Additionally, monitoring WooCommerce coupon creation logs for unusual or unauthorized activity can help detect exploitation attempts early. If feasible, temporarily disabling the 'send_test_email' AJAX action or the Reviewify plugin itself can serve as a stopgap measure. Applying Web Application Firewall (WAF) rules to block suspicious AJAX requests related to coupon creation may also help. Regularly reviewing and tightening WordPress user roles and capabilities, combined with security plugins that enforce capability checks, will further reduce risk. Finally, educating store administrators about this vulnerability and encouraging prompt action is critical.
Affected Countries
United States, United Kingdom, Germany, Canada, Australia, France, India, Brazil, Japan, Netherlands, Italy
CVE-2025-14070: CWE-862 Missing Authorization in xfinitysoft Reviewify — Review Discounts & Photo/Video Reviews for WooCommerce
Description
The Reviewify plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'send_test_email' AJAX action in all versions up to, and including, 1.0.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to create arbitrary WooCommerce discount coupons, potentially causing financial loss to the store.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-14070 is a vulnerability classified under CWE-862 (Missing Authorization) affecting the Reviewify — Review Discounts & Photo/Video Reviews plugin for WooCommerce on WordPress. The root cause is the absence of a capability check on the 'send_test_email' AJAX action, which is accessible to authenticated users with Contributor-level permissions or higher. This flaw enables such users to create arbitrary WooCommerce discount coupons without proper authorization. Since WooCommerce coupons can directly impact store revenue by providing discounts, unauthorized creation can lead to financial losses and potential abuse of promotional offers. The vulnerability affects all versions up to 1.0.6 inclusive. The CVSS v3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required beyond Contributor, no user interaction, and a significant impact on integrity but no impact on confidentiality or availability. The vulnerability was reserved in December 2025 and published in January 2026. No patches or known exploits are currently available, but the issue is publicly disclosed, increasing the risk of exploitation. The flaw is particularly concerning in environments where multiple users have Contributor or higher roles, such as multi-author blogs or stores with delegated content management.
Potential Impact
The primary impact of this vulnerability is unauthorized modification of WooCommerce store data, specifically the creation of arbitrary discount coupons. This can lead to direct financial losses due to unauthorized discounts being applied to purchases. Additionally, it can undermine customer trust if fraudulent discounts are exploited or if the store's promotional integrity is compromised. The vulnerability does not affect confidentiality or availability but severely impacts data integrity. Attackers with Contributor-level access, which is a relatively low privilege level, can exploit this flaw without requiring administrator rights or user interaction, increasing the risk in environments with multiple authenticated users. This can also facilitate further attacks by incentivizing fraudulent purchases or coupon abuse. Organizations relying on the affected plugin risk revenue loss, reputational damage, and potential operational disruptions due to the need for incident response and remediation.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately update the Reviewify plugin to a patched version once available from the vendor. Until a patch is released, administrators should restrict Contributor-level access and above to trusted users only, minimizing the risk of exploitation. Implementing strict role-based access controls and auditing user permissions can reduce exposure. Additionally, monitoring WooCommerce coupon creation logs for unusual or unauthorized activity can help detect exploitation attempts early. If feasible, temporarily disabling the 'send_test_email' AJAX action or the Reviewify plugin itself can serve as a stopgap measure. Applying Web Application Firewall (WAF) rules to block suspicious AJAX requests related to coupon creation may also help. Regularly reviewing and tightening WordPress user roles and capabilities, combined with security plugins that enforce capability checks, will further reduce risk. Finally, educating store administrators about this vulnerability and encouraging prompt action is critical.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-04T21:14:37.597Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 695e4c137349d0379d7d5780
Added to database: 1/7/2026, 12:05:39 PM
Last enriched: 2/27/2026, 10:47:42 AM
Last updated: 3/24/2026, 3:54:15 PM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.