CVE-2025-14450: CWE-862 Missing Authorization in wpswings Wallet System for WooCommerce – Digital Wallet, Buy Now Pay Later (BNPL), Instant Cashback, Referral program, Partial & Subscription Payments
CVE-2025-14450 is a medium-severity vulnerability in the Wallet System for WooCommerce plugin that allows authenticated users with Subscriber-level access or higher to manipulate wallet withdrawal requests due to missing authorization checks. Attackers can increase their own wallet balances or decrease those of other users without proper permissions. The vulnerability arises from the lack of capability checks in the 'change_wallet_fund_request_status_callback' function across all plugin versions up to 2. 7. 2. Exploitation requires no user interaction but does require authentication at a low privilege level, making it relatively easy to exploit in environments where user registration is open or compromised accounts exist. The impact is primarily on data integrity, potentially leading to financial losses and trust issues for e-commerce platforms using this plugin. No known exploits are currently reported in the wild. European organizations using WooCommerce with this plugin are at risk, especially those in countries with high e-commerce activity and WooCommerce adoption. Mitigation involves applying vendor patches when available, restricting user roles, and monitoring wallet transactions for anomalies.
AI Analysis
Technical Summary
The Wallet System for WooCommerce plugin, widely used to provide digital wallet functionalities such as Buy Now Pay Later (BNPL), instant cashback, referral programs, and subscription payments, contains a critical authorization vulnerability identified as CVE-2025-14450. This vulnerability stems from a missing capability check in the 'change_wallet_fund_request_status_callback' function, which handles wallet withdrawal request status changes. Because the plugin fails to verify whether the authenticated user has the appropriate permissions before processing these requests, any user with Subscriber-level access or higher can exploit this flaw. Attackers can arbitrarily modify wallet balances by approving or rejecting withdrawal requests, effectively increasing their own funds or decreasing those of other users. The vulnerability affects all versions up to and including 2.7.2. The CVSS v3.1 score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, and the requirement for low privileges but no user interaction. The flaw impacts data integrity without affecting confidentiality or availability. Although no known exploits are currently reported, the ease of exploitation and the financial nature of the vulnerability make it a significant risk for e-commerce sites relying on this plugin. The vulnerability is particularly concerning for platforms with open user registration or weak user access controls, as attackers can gain Subscriber-level access and exploit the flaw. The lack of patches at the time of reporting necessitates immediate risk mitigation through access control and monitoring.
Potential Impact
For European organizations, especially e-commerce businesses using WooCommerce with the Wallet System plugin, this vulnerability poses a direct financial risk. Attackers can manipulate wallet balances, leading to unauthorized fund withdrawals or fraudulent credit increases, which can result in monetary losses and damage to customer trust. The integrity of financial transactions is compromised, potentially affecting accounting and reconciliation processes. This could also lead to regulatory scrutiny under European data protection and financial transaction laws, such as GDPR and PSD2, if customer funds are mishandled or fraud occurs. The vulnerability may also facilitate further attacks if attackers leverage increased wallet balances to make purchases or launder money. Organizations with large user bases or those operating in competitive markets may suffer reputational damage. The medium severity rating suggests a moderate but tangible risk that requires prompt attention to avoid exploitation.
Mitigation Recommendations
1. Immediately restrict user registration and review user roles to ensure that only trusted users have Subscriber-level or higher access. 2. Implement strict role-based access controls (RBAC) to limit wallet management capabilities to trusted administrators only. 3. Monitor wallet transaction logs and withdrawal requests for unusual patterns or anomalies indicative of exploitation attempts. 4. Apply any vendor patches or updates as soon as they become available to address the missing authorization check. 5. If patches are not yet available, consider temporarily disabling the wallet withdrawal functionality or the entire Wallet System plugin to prevent exploitation. 6. Conduct regular security audits and penetration tests focusing on user privilege escalation and wallet transaction integrity. 7. Educate staff and users about the risks of phishing or credential compromise that could lead to unauthorized access. 8. Use Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting wallet functions. 9. Implement multi-factor authentication (MFA) for user accounts to reduce the risk of account takeover. 10. Maintain comprehensive backups and incident response plans to quickly recover from any exploitation.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14450: CWE-862 Missing Authorization in wpswings Wallet System for WooCommerce – Digital Wallet, Buy Now Pay Later (BNPL), Instant Cashback, Referral program, Partial & Subscription Payments
Description
CVE-2025-14450 is a medium-severity vulnerability in the Wallet System for WooCommerce plugin that allows authenticated users with Subscriber-level access or higher to manipulate wallet withdrawal requests due to missing authorization checks. Attackers can increase their own wallet balances or decrease those of other users without proper permissions. The vulnerability arises from the lack of capability checks in the 'change_wallet_fund_request_status_callback' function across all plugin versions up to 2. 7. 2. Exploitation requires no user interaction but does require authentication at a low privilege level, making it relatively easy to exploit in environments where user registration is open or compromised accounts exist. The impact is primarily on data integrity, potentially leading to financial losses and trust issues for e-commerce platforms using this plugin. No known exploits are currently reported in the wild. European organizations using WooCommerce with this plugin are at risk, especially those in countries with high e-commerce activity and WooCommerce adoption. Mitigation involves applying vendor patches when available, restricting user roles, and monitoring wallet transactions for anomalies.
AI-Powered Analysis
Technical Analysis
The Wallet System for WooCommerce plugin, widely used to provide digital wallet functionalities such as Buy Now Pay Later (BNPL), instant cashback, referral programs, and subscription payments, contains a critical authorization vulnerability identified as CVE-2025-14450. This vulnerability stems from a missing capability check in the 'change_wallet_fund_request_status_callback' function, which handles wallet withdrawal request status changes. Because the plugin fails to verify whether the authenticated user has the appropriate permissions before processing these requests, any user with Subscriber-level access or higher can exploit this flaw. Attackers can arbitrarily modify wallet balances by approving or rejecting withdrawal requests, effectively increasing their own funds or decreasing those of other users. The vulnerability affects all versions up to and including 2.7.2. The CVSS v3.1 score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, and the requirement for low privileges but no user interaction. The flaw impacts data integrity without affecting confidentiality or availability. Although no known exploits are currently reported, the ease of exploitation and the financial nature of the vulnerability make it a significant risk for e-commerce sites relying on this plugin. The vulnerability is particularly concerning for platforms with open user registration or weak user access controls, as attackers can gain Subscriber-level access and exploit the flaw. The lack of patches at the time of reporting necessitates immediate risk mitigation through access control and monitoring.
Potential Impact
For European organizations, especially e-commerce businesses using WooCommerce with the Wallet System plugin, this vulnerability poses a direct financial risk. Attackers can manipulate wallet balances, leading to unauthorized fund withdrawals or fraudulent credit increases, which can result in monetary losses and damage to customer trust. The integrity of financial transactions is compromised, potentially affecting accounting and reconciliation processes. This could also lead to regulatory scrutiny under European data protection and financial transaction laws, such as GDPR and PSD2, if customer funds are mishandled or fraud occurs. The vulnerability may also facilitate further attacks if attackers leverage increased wallet balances to make purchases or launder money. Organizations with large user bases or those operating in competitive markets may suffer reputational damage. The medium severity rating suggests a moderate but tangible risk that requires prompt attention to avoid exploitation.
Mitigation Recommendations
1. Immediately restrict user registration and review user roles to ensure that only trusted users have Subscriber-level or higher access. 2. Implement strict role-based access controls (RBAC) to limit wallet management capabilities to trusted administrators only. 3. Monitor wallet transaction logs and withdrawal requests for unusual patterns or anomalies indicative of exploitation attempts. 4. Apply any vendor patches or updates as soon as they become available to address the missing authorization check. 5. If patches are not yet available, consider temporarily disabling the wallet withdrawal functionality or the entire Wallet System plugin to prevent exploitation. 6. Conduct regular security audits and penetration tests focusing on user privilege escalation and wallet transaction integrity. 7. Educate staff and users about the risks of phishing or credential compromise that could lead to unauthorized access. 8. Use Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting wallet functions. 9. Implement multi-factor authentication (MFA) for user accounts to reduce the risk of account takeover. 10. Maintain comprehensive backups and incident response plans to quickly recover from any exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-10T14:23:46.780Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696af5b4b22c7ad8685027b1
Added to database: 1/17/2026, 2:36:36 AM
Last enriched: 1/17/2026, 2:51:24 AM
Last updated: 1/17/2026, 3:59:31 AM
Views: 3
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0820: CWE-862 Missing Authorization in sweetdaisy86 RepairBuddy – Repair Shop CRM & Booking Plugin for WordPress
MediumCVE-2026-0682: CWE-918 Server-Side Request Forgery (SSRF) in andy_moyle Church Admin
LowCVE-2025-14463: CWE-862 Missing Authorization in naa986 Payment Button for PayPal
MediumCVE-2025-13725: CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in thimpress Thim Blocks
MediumCVE-2025-15403: CWE-269 Improper Privilege Management in metagauss RegistrationMagic – Custom Registration Forms, User Registration, Payment, and User Login
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.