CVE-2025-14463: CWE-862 Missing Authorization in naa986 Payment Button for PayPal
The Payment Button for PayPal plugin for WordPress is vulnerable to unauthorized order creation in all versions up to, and including, 1.2.3.41. This is due to the plugin exposing a public AJAX endpoint (`wppaypalcheckout_ajax_process_order`) that processes checkout results without any authentication or server-side verification of the PayPal transaction. This makes it possible for unauthenticated attackers to create arbitrary orders on the site with any chosen transaction ID, payment status, product name, amount, or customer information via direct POST requests to the AJAX endpoint, granted they can bypass basic parameter validation. If email sending is enabled, the plugin will also trigger purchase receipt emails to any email address supplied in the request, leading to order database corruption and unauthorized outgoing emails without any real PayPal transaction taking place.
AI Analysis
Technical Summary
CVE-2025-14463 affects the Payment Button for PayPal plugin for WordPress, versions up to and including 1.2.3.41. The vulnerability stems from a publicly accessible AJAX endpoint named `wppaypalcheckout_ajax_process_order` that processes checkout results without any authentication or server-side validation of the PayPal transaction. This lack of authorization (CWE-862) allows unauthenticated attackers to craft POST requests with arbitrary parameters such as transaction ID, payment status, product name, amount, and customer information. Because the plugin does not verify the legitimacy of these transactions with PayPal, attackers can create fake orders that corrupt the order database and trigger purchase receipt emails to any supplied email address if email notifications are enabled. This can lead to unauthorized outgoing emails, potentially facilitating phishing or spam campaigns, and undermines the integrity of the e-commerce system. The vulnerability requires no privileges or user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 5.3 (medium), reflecting the lack of confidentiality or availability impact but a clear integrity impact. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was reserved in December 2025 and published in January 2026 by Wordfence.
Potential Impact
For European organizations using WordPress sites with the Payment Button for PayPal plugin, this vulnerability can lead to significant integrity issues in their e-commerce order databases. Attackers can inject fraudulent orders, causing financial reconciliation problems and operational disruptions. The unauthorized sending of purchase receipt emails can damage customer trust, lead to reputational harm, and potentially expose organizations to regulatory scrutiny under GDPR if personal data is mishandled or abused. Additionally, the ability to send arbitrary emails could be leveraged for phishing or social engineering attacks targeting customers or employees. While the vulnerability does not directly impact confidentiality or availability, the indirect effects on business processes and customer relationships can be substantial. Organizations relying on automated order processing and email notifications are particularly vulnerable. The lack of authentication and server-side verification means the attack surface is broad, and exploitation can be automated at scale.
Mitigation Recommendations
European organizations should immediately assess whether they use the Payment Button for PayPal plugin on their WordPress sites and identify the plugin version. If the plugin is in use, the primary mitigation is to disable or uninstall the plugin until a patched version is released. If disabling is not feasible, restrict access to the vulnerable AJAX endpoint (`wppaypalcheckout_ajax_process_order`) by implementing web application firewall (WAF) rules or server-level access controls to allow only trusted IP addresses or authenticated users. Implement server-side validation of PayPal transactions by integrating PayPal's IPN (Instant Payment Notification) or API verification to confirm transaction authenticity before processing orders. Monitor order creation logs for unusual patterns such as a high volume of orders from single IPs or suspicious transaction IDs. Disable email notifications for purchases temporarily to prevent unauthorized emails from being sent. Finally, keep WordPress core and all plugins updated and subscribe to vendor advisories for timely patch releases.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14463: CWE-862 Missing Authorization in naa986 Payment Button for PayPal
Description
The Payment Button for PayPal plugin for WordPress is vulnerable to unauthorized order creation in all versions up to, and including, 1.2.3.41. This is due to the plugin exposing a public AJAX endpoint (`wppaypalcheckout_ajax_process_order`) that processes checkout results without any authentication or server-side verification of the PayPal transaction. This makes it possible for unauthenticated attackers to create arbitrary orders on the site with any chosen transaction ID, payment status, product name, amount, or customer information via direct POST requests to the AJAX endpoint, granted they can bypass basic parameter validation. If email sending is enabled, the plugin will also trigger purchase receipt emails to any email address supplied in the request, leading to order database corruption and unauthorized outgoing emails without any real PayPal transaction taking place.
AI-Powered Analysis
Technical Analysis
CVE-2025-14463 affects the Payment Button for PayPal plugin for WordPress, versions up to and including 1.2.3.41. The vulnerability stems from a publicly accessible AJAX endpoint named `wppaypalcheckout_ajax_process_order` that processes checkout results without any authentication or server-side validation of the PayPal transaction. This lack of authorization (CWE-862) allows unauthenticated attackers to craft POST requests with arbitrary parameters such as transaction ID, payment status, product name, amount, and customer information. Because the plugin does not verify the legitimacy of these transactions with PayPal, attackers can create fake orders that corrupt the order database and trigger purchase receipt emails to any supplied email address if email notifications are enabled. This can lead to unauthorized outgoing emails, potentially facilitating phishing or spam campaigns, and undermines the integrity of the e-commerce system. The vulnerability requires no privileges or user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 5.3 (medium), reflecting the lack of confidentiality or availability impact but a clear integrity impact. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was reserved in December 2025 and published in January 2026 by Wordfence.
Potential Impact
For European organizations using WordPress sites with the Payment Button for PayPal plugin, this vulnerability can lead to significant integrity issues in their e-commerce order databases. Attackers can inject fraudulent orders, causing financial reconciliation problems and operational disruptions. The unauthorized sending of purchase receipt emails can damage customer trust, lead to reputational harm, and potentially expose organizations to regulatory scrutiny under GDPR if personal data is mishandled or abused. Additionally, the ability to send arbitrary emails could be leveraged for phishing or social engineering attacks targeting customers or employees. While the vulnerability does not directly impact confidentiality or availability, the indirect effects on business processes and customer relationships can be substantial. Organizations relying on automated order processing and email notifications are particularly vulnerable. The lack of authentication and server-side verification means the attack surface is broad, and exploitation can be automated at scale.
Mitigation Recommendations
European organizations should immediately assess whether they use the Payment Button for PayPal plugin on their WordPress sites and identify the plugin version. If the plugin is in use, the primary mitigation is to disable or uninstall the plugin until a patched version is released. If disabling is not feasible, restrict access to the vulnerable AJAX endpoint (`wppaypalcheckout_ajax_process_order`) by implementing web application firewall (WAF) rules or server-level access controls to allow only trusted IP addresses or authenticated users. Implement server-side validation of PayPal transactions by integrating PayPal's IPN (Instant Payment Notification) or API verification to confirm transaction authenticity before processing orders. Monitor order creation logs for unusual patterns such as a high volume of orders from single IPs or suspicious transaction IDs. Disable email notifications for purchases temporarily to prevent unauthorized emails from being sent. Finally, keep WordPress core and all plugins updated and subscribe to vendor advisories for timely patch releases.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-10T16:00:08.500Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696b0749b22c7ad868788fcb
Added to database: 1/17/2026, 3:51:37 AM
Last enriched: 1/24/2026, 7:48:48 PM
Last updated: 2/7/2026, 10:38:34 AM
Views: 28
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.