Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14460: CWE-862 Missing Authorization in enartia Piraeus Bank WooCommerce Payment Gateway

0
Medium
VulnerabilityCVE-2025-14460cvecve-2025-14460cwe-862
Published: Wed Jan 07 2026 (01/07/2026, 09:21:04 UTC)
Source: CVE Database V5
Vendor/Project: enartia
Product: Piraeus Bank WooCommerce Payment Gateway

Description

CVE-2025-14460 is a medium severity vulnerability in the Piraeus Bank WooCommerce Payment Gateway plugin for WordPress, affecting all versions up to 3. 1. 4. It allows unauthenticated attackers to modify order statuses to 'failed' via a missing authorization check on the payment callback endpoint. Attackers can exploit this by enumerating sequential order IDs and sending crafted requests to the publicly accessible WooCommerce API. This can disrupt business operations by causing canceled shipments, inventory mismanagement, and revenue loss. No known exploits are currently reported in the wild. The vulnerability does not impact confidentiality or availability but compromises integrity by allowing unauthorized order status changes. European organizations using this plugin, especially e-commerce businesses relying on Piraeus Bank payment processing, are at risk. Mitigation requires patching or implementing strict authorization checks on the callback handler and monitoring for suspicious API activity.

AI-Powered Analysis

AILast updated: 01/14/2026, 15:58:05 UTC

Technical Analysis

CVE-2025-14460 is a vulnerability classified under CWE-862 (Missing Authorization) found in the Piraeus Bank WooCommerce Payment Gateway plugin for WordPress, affecting all versions up to and including 3.1.4. The flaw exists because the payment callback endpoint handler does not perform proper authorization checks when processing the 'fail' callback from the payment gateway. This endpoint is publicly accessible via the WooCommerce API and accepts an order ID parameter (MerchantReference), which is a sequential integer and thus easily enumerable by attackers. By exploiting this, an unauthenticated attacker can arbitrarily change the status of any order to 'failed' without any authentication or user interaction. This unauthorized modification can disrupt normal business workflows by triggering order cancellations, halting shipments, causing inventory inconsistencies, and ultimately leading to financial losses. The vulnerability has a CVSS 3.1 base score of 5.3, reflecting a medium severity level, primarily due to the lack of confidentiality or availability impact but a clear integrity impact. No patches or known exploits have been reported at the time of publication. The vulnerability highlights a critical security oversight in the plugin's design, where the callback endpoint trusts input parameters without verifying the legitimacy of the request or the requester's identity. This is particularly concerning for e-commerce platforms relying on this payment gateway, as it undermines the reliability of order processing and payment status management.

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce integrated with the Piraeus Bank payment gateway, this vulnerability poses a significant risk to business continuity and operational integrity. Unauthorized order status changes to 'failed' can lead to premature cancellation of orders, disrupting supply chains and customer satisfaction. Inventory management systems may be affected due to incorrect order states, potentially causing stock misallocations or shortages. Financially, businesses may suffer revenue loss from canceled transactions and increased customer service overhead to resolve disputes. Although the vulnerability does not expose sensitive data or cause denial of service, the integrity breach can erode trust in the payment process and damage brand reputation. Given the plugin’s specific association with Piraeus Bank, organizations in Greece and surrounding European markets that use this payment gateway are particularly vulnerable. The lack of authentication requirements and ease of exploitation increase the likelihood of opportunistic attacks, especially from automated scripts enumerating order IDs. The absence of known exploits in the wild suggests the vulnerability is not yet actively exploited, but the risk remains high due to its straightforward exploitation vector.

Mitigation Recommendations

To mitigate CVE-2025-14460, affected organizations should prioritize updating the Piraeus Bank WooCommerce Payment Gateway plugin once a patch is released by the vendor. In the absence of an official patch, immediate steps include implementing strict authorization checks on the payment callback endpoint to verify the legitimacy of the request origin and ensure only authenticated and authorized entities can modify order statuses. This can be achieved by validating cryptographic signatures or tokens provided by the payment gateway in callbacks. Additionally, rate limiting and anomaly detection on the API endpoint can help detect and block enumeration attempts. Organizations should audit their order logs for suspicious status changes and reconcile inventory and shipment records to identify potential disruptions. Employing web application firewalls (WAFs) with custom rules to block unauthorized access to the callback endpoint can provide a temporary protective layer. Finally, educating development and security teams about secure API design principles, especially regarding authorization and input validation, will help prevent similar vulnerabilities in the future.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T15:56:31.158Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e4c147349d0379d7d5801

Added to database: 1/7/2026, 12:05:40 PM

Last enriched: 1/14/2026, 3:58:05 PM

Last updated: 2/6/2026, 8:12:28 PM

Views: 64

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats