Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14460: CWE-862 Missing Authorization in enartia Piraeus Bank WooCommerce Payment Gateway

0
Medium
VulnerabilityCVE-2025-14460cvecve-2025-14460cwe-862
Published: Wed Jan 07 2026 (01/07/2026, 09:21:04 UTC)
Source: CVE Database V5
Vendor/Project: enartia
Product: Piraeus Bank WooCommerce Payment Gateway

Description

The Piraeus Bank WooCommerce Payment Gateway plugin for WordPress is vulnerable to unauthorized order status modification in all versions up to, and including, 3.1.4. This is due to missing authorization checks on the payment callback endpoint handler when processing the 'fail' callback from the payment gateway. This makes it possible for unauthenticated attackers to change any order's status to 'failed' via the publicly accessible WooCommerce API endpoint by providing only the order ID (MerchantReference parameter), which can be easily enumerated as order IDs are sequential integers. This can cause significant business disruption including canceled shipments, inventory issues, and loss of revenue.

AI-Powered Analysis

AILast updated: 01/07/2026, 12:17:27 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14460 affects the enartia Piraeus Bank WooCommerce Payment Gateway plugin for WordPress, specifically all versions up to and including 3.1.4. The root cause is a missing authorization check (CWE-862) on the payment callback endpoint handler that processes the 'fail' callback from the payment gateway. This endpoint is publicly accessible and does not verify the legitimacy of the requestor. Attackers can exploit this by sending crafted requests containing the MerchantReference parameter, which corresponds to the order ID. Since order IDs are sequential integers, an attacker can easily enumerate valid order IDs and change the status of any order to 'failed' without authentication or user interaction. This unauthorized status modification can disrupt business operations by triggering cancellations of shipments, causing inventory discrepancies, and potentially leading to financial losses. The CVSS v3.1 score is 5.3 (medium), reflecting the lack of confidentiality or availability impact but a clear integrity impact. No patches are currently linked, and no known exploits have been reported in the wild, but the vulnerability is publicly disclosed and should be addressed promptly.

Potential Impact

For European organizations, especially e-commerce businesses using WooCommerce with the Piraeus Bank payment gateway plugin, this vulnerability can lead to significant operational disruptions. Unauthorized order status changes to 'failed' can cause premature cancellation of shipments, leading to customer dissatisfaction and reputational damage. Inventory management systems may be affected due to incorrect order statuses, resulting in stock imbalances and potential overstock or stockouts. Financially, businesses may suffer revenue loss due to disrupted order fulfillment and increased customer service costs. Additionally, the ease of exploitation without authentication increases the risk of automated attacks targeting multiple orders, amplifying the impact. Organizations in sectors with high transaction volumes or those relying heavily on this payment gateway are at greater risk. Furthermore, the disruption could indirectly affect compliance with consumer protection regulations prevalent in Europe, such as the GDPR, if customer trust is undermined.

Mitigation Recommendations

Immediate mitigation should focus on applying any available patches from the vendor once released. In the absence of patches, organizations should implement compensating controls such as restricting access to the payment callback endpoint via web application firewalls (WAF) or IP whitelisting to only trusted payment gateway IP addresses. Monitoring and alerting on unusual order status changes, especially to 'failed', can help detect exploitation attempts early. Rate limiting requests to the callback endpoint can reduce the risk of mass enumeration attacks. Additionally, modifying the plugin or API to require authentication or cryptographic verification (e.g., HMAC signatures) on callback requests will prevent unauthorized status changes. Organizations should also review order ID generation to avoid predictable sequential IDs, reducing the ease of enumeration. Finally, educating operational teams to recognize and respond to suspicious order status modifications will enhance incident response capabilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T15:56:31.158Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e4c147349d0379d7d5801

Added to database: 1/7/2026, 12:05:40 PM

Last enriched: 1/7/2026, 12:17:27 PM

Last updated: 1/8/2026, 10:54:54 PM

Views: 9

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats