Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14450: CWE-862 Missing Authorization in wpswings Wallet System for WooCommerce – Digital Wallet, Buy Now Pay Later (BNPL), Instant Cashback, Referral program, Partial & Subscription Payments

0
Medium
VulnerabilityCVE-2025-14450cvecve-2025-14450cwe-862
Published: Sat Jan 17 2026 (01/17/2026, 02:22:31 UTC)
Source: CVE Database V5
Vendor/Project: wpswings
Product: Wallet System for WooCommerce – Digital Wallet, Buy Now Pay Later (BNPL), Instant Cashback, Referral program, Partial & Subscription Payments

Description

CVE-2025-14450 is a medium-severity vulnerability in the Wallet System for WooCommerce plugin that allows authenticated users with Subscriber-level access or higher to manipulate wallet withdrawal requests due to missing authorization checks. Attackers can increase their own wallet balances or decrease those of other users without proper permissions. The vulnerability arises from the lack of capability checks in the 'change_wallet_fund_request_status_callback' function across all plugin versions up to 2. 7. 2. Exploitation requires no user interaction but does require authentication at a low privilege level, making it relatively easy to exploit in environments where user registration is open or compromised accounts exist. The impact is primarily on data integrity, potentially leading to financial losses and trust issues for e-commerce platforms using this plugin. No known exploits are currently reported in the wild. European organizations using WooCommerce with this plugin are at risk, especially those in countries with high e-commerce activity and WooCommerce adoption. Mitigation involves applying vendor patches when available, restricting user roles, and monitoring wallet transactions for anomalies.

AI-Powered Analysis

AILast updated: 01/17/2026, 02:51:24 UTC

Technical Analysis

The Wallet System for WooCommerce plugin, widely used to provide digital wallet functionalities such as Buy Now Pay Later (BNPL), instant cashback, referral programs, and subscription payments, contains a critical authorization vulnerability identified as CVE-2025-14450. This vulnerability stems from a missing capability check in the 'change_wallet_fund_request_status_callback' function, which handles wallet withdrawal request status changes. Because the plugin fails to verify whether the authenticated user has the appropriate permissions before processing these requests, any user with Subscriber-level access or higher can exploit this flaw. Attackers can arbitrarily modify wallet balances by approving or rejecting withdrawal requests, effectively increasing their own funds or decreasing those of other users. The vulnerability affects all versions up to and including 2.7.2. The CVSS v3.1 score is 6.5 (medium severity), reflecting the network attack vector, low attack complexity, and the requirement for low privileges but no user interaction. The flaw impacts data integrity without affecting confidentiality or availability. Although no known exploits are currently reported, the ease of exploitation and the financial nature of the vulnerability make it a significant risk for e-commerce sites relying on this plugin. The vulnerability is particularly concerning for platforms with open user registration or weak user access controls, as attackers can gain Subscriber-level access and exploit the flaw. The lack of patches at the time of reporting necessitates immediate risk mitigation through access control and monitoring.

Potential Impact

For European organizations, especially e-commerce businesses using WooCommerce with the Wallet System plugin, this vulnerability poses a direct financial risk. Attackers can manipulate wallet balances, leading to unauthorized fund withdrawals or fraudulent credit increases, which can result in monetary losses and damage to customer trust. The integrity of financial transactions is compromised, potentially affecting accounting and reconciliation processes. This could also lead to regulatory scrutiny under European data protection and financial transaction laws, such as GDPR and PSD2, if customer funds are mishandled or fraud occurs. The vulnerability may also facilitate further attacks if attackers leverage increased wallet balances to make purchases or launder money. Organizations with large user bases or those operating in competitive markets may suffer reputational damage. The medium severity rating suggests a moderate but tangible risk that requires prompt attention to avoid exploitation.

Mitigation Recommendations

1. Immediately restrict user registration and review user roles to ensure that only trusted users have Subscriber-level or higher access. 2. Implement strict role-based access controls (RBAC) to limit wallet management capabilities to trusted administrators only. 3. Monitor wallet transaction logs and withdrawal requests for unusual patterns or anomalies indicative of exploitation attempts. 4. Apply any vendor patches or updates as soon as they become available to address the missing authorization check. 5. If patches are not yet available, consider temporarily disabling the wallet withdrawal functionality or the entire Wallet System plugin to prevent exploitation. 6. Conduct regular security audits and penetration tests focusing on user privilege escalation and wallet transaction integrity. 7. Educate staff and users about the risks of phishing or credential compromise that could lead to unauthorized access. 8. Use Web Application Firewalls (WAFs) with custom rules to detect and block suspicious requests targeting wallet functions. 9. Implement multi-factor authentication (MFA) for user accounts to reduce the risk of account takeover. 10. Maintain comprehensive backups and incident response plans to quickly recover from any exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T14:23:46.780Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696af5b4b22c7ad8685027b1

Added to database: 1/17/2026, 2:36:36 AM

Last enriched: 1/17/2026, 2:51:24 AM

Last updated: 1/17/2026, 3:59:31 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats