CVE-2025-14294: CWE-306 Missing Authentication for Critical Function in razorpay Razorpay for WooCommerce
The Razorpay for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the getCouponList() function in all versions up to, and including, 4.7.8. This is due to the checkAuthCredentials() permission callback always returning true, providing no actual authentication. This makes it possible for unauthenticated attackers to modify the billing and shipping contact information (email and phone) of any WooCommerce order by knowing or guessing the order ID.
AI Analysis
Technical Summary
CVE-2025-14294 is a vulnerability identified in the Razorpay for WooCommerce plugin for WordPress, affecting all versions up to and including 4.7.8. The root cause is a missing authentication mechanism in the getCouponList() function, where the permission callback checkAuthCredentials() erroneously always returns true, effectively bypassing any authentication or authorization controls. This flaw allows unauthenticated attackers to modify critical order data, specifically the billing and shipping contact information such as email addresses and phone numbers, by simply knowing or guessing the WooCommerce order ID. The vulnerability does not expose confidential data directly but compromises data integrity by enabling unauthorized changes to order details. The attack vector is remote and requires no privileges or user interaction, making exploitation straightforward. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to e-commerce sites using this plugin, as attackers could manipulate order contact details to intercept communications, commit fraud, or disrupt order fulfillment. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with the vector indicating network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to integrity loss without affecting confidentiality or availability.
Potential Impact
For European organizations, particularly e-commerce businesses relying on WooCommerce integrated with Razorpay payment solutions, this vulnerability can lead to unauthorized modification of customer order information. This can result in fraudulent activities such as redirecting order confirmations, invoices, or shipping notifications to attacker-controlled contacts, potentially enabling financial fraud or identity theft. The integrity compromise may also disrupt order fulfillment processes, damaging customer trust and brand reputation. Although the vulnerability does not directly expose sensitive data, the ability to alter contact details can facilitate social engineering or phishing attacks. Given the widespread use of WooCommerce in Europe and Razorpay's growing adoption, especially among small to medium enterprises, the threat could affect a broad range of businesses. The absence of authentication requirements and ease of exploitation increase the risk of automated attacks targeting multiple orders. This could lead to operational disruptions and increased support costs for affected organizations.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable getCouponList() function by implementing custom authentication or authorization checks at the WordPress or plugin level, such as using hooks or filters to enforce capability checks before processing requests. Organizations should monitor WooCommerce order modifications for unusual changes in billing or shipping contact details, setting up alerts for suspicious activity. Applying any official patches or updates from Razorpay as soon as they become available is critical. In the absence of patches, temporarily disabling the Razorpay for WooCommerce plugin or replacing it with alternative payment solutions can reduce exposure. Additionally, implementing web application firewalls (WAFs) with rules to detect and block unauthorized attempts to access order modification endpoints can help mitigate exploitation. Educating customer service teams to verify order changes through secondary channels can also reduce fraud impact. Regular security audits and penetration testing focusing on e-commerce workflows will help identify similar weaknesses.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain
CVE-2025-14294: CWE-306 Missing Authentication for Critical Function in razorpay Razorpay for WooCommerce
Description
The Razorpay for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the getCouponList() function in all versions up to, and including, 4.7.8. This is due to the checkAuthCredentials() permission callback always returning true, providing no actual authentication. This makes it possible for unauthenticated attackers to modify the billing and shipping contact information (email and phone) of any WooCommerce order by knowing or guessing the order ID.
AI-Powered Analysis
Technical Analysis
CVE-2025-14294 is a vulnerability identified in the Razorpay for WooCommerce plugin for WordPress, affecting all versions up to and including 4.7.8. The root cause is a missing authentication mechanism in the getCouponList() function, where the permission callback checkAuthCredentials() erroneously always returns true, effectively bypassing any authentication or authorization controls. This flaw allows unauthenticated attackers to modify critical order data, specifically the billing and shipping contact information such as email addresses and phone numbers, by simply knowing or guessing the WooCommerce order ID. The vulnerability does not expose confidential data directly but compromises data integrity by enabling unauthorized changes to order details. The attack vector is remote and requires no privileges or user interaction, making exploitation straightforward. Although no known exploits are currently reported in the wild, the vulnerability poses a significant risk to e-commerce sites using this plugin, as attackers could manipulate order contact details to intercept communications, commit fraud, or disrupt order fulfillment. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with the vector indicating network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to integrity loss without affecting confidentiality or availability.
Potential Impact
For European organizations, particularly e-commerce businesses relying on WooCommerce integrated with Razorpay payment solutions, this vulnerability can lead to unauthorized modification of customer order information. This can result in fraudulent activities such as redirecting order confirmations, invoices, or shipping notifications to attacker-controlled contacts, potentially enabling financial fraud or identity theft. The integrity compromise may also disrupt order fulfillment processes, damaging customer trust and brand reputation. Although the vulnerability does not directly expose sensitive data, the ability to alter contact details can facilitate social engineering or phishing attacks. Given the widespread use of WooCommerce in Europe and Razorpay's growing adoption, especially among small to medium enterprises, the threat could affect a broad range of businesses. The absence of authentication requirements and ease of exploitation increase the risk of automated attacks targeting multiple orders. This could lead to operational disruptions and increased support costs for affected organizations.
Mitigation Recommendations
Immediate mitigation should focus on restricting access to the vulnerable getCouponList() function by implementing custom authentication or authorization checks at the WordPress or plugin level, such as using hooks or filters to enforce capability checks before processing requests. Organizations should monitor WooCommerce order modifications for unusual changes in billing or shipping contact details, setting up alerts for suspicious activity. Applying any official patches or updates from Razorpay as soon as they become available is critical. In the absence of patches, temporarily disabling the Razorpay for WooCommerce plugin or replacing it with alternative payment solutions can reduce exposure. Additionally, implementing web application firewalls (WAFs) with rules to detect and block unauthorized attempts to access order modification endpoints can help mitigate exploitation. Educating customer service teams to verify order changes through secondary channels can also reduce fraud impact. Regular security audits and penetration testing focusing on e-commerce workflows will help identify similar weaknesses.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-08T20:16:17.740Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 699697f36aea4a407a3be06c
Added to database: 2/19/2026, 4:56:19 AM
Last enriched: 2/19/2026, 5:28:33 AM
Last updated: 2/21/2026, 12:16:08 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-27203: CWE-15: External Control of System or Configuration Setting in YosefHayim ebay-mcp
HighCVE-2026-27168: CWE-122: Heap-based Buffer Overflow in HappySeaFox sail
HighCVE-2026-27134: CWE-287: Improper Authentication in strimzi strimzi-kafka-operator
HighCVE-2026-27190: CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in denoland deno
HighCVE-2026-27026: CWE-770: Allocation of Resources Without Limits or Throttling in py-pdf pypdf
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.