Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14463: CWE-862 Missing Authorization in naa986 Payment Button for PayPal

0
Medium
VulnerabilityCVE-2025-14463cvecve-2025-14463cwe-862
Published: Sat Jan 17 2026 (01/17/2026, 03:24:24 UTC)
Source: CVE Database V5
Vendor/Project: naa986
Product: Payment Button for PayPal

Description

The Payment Button for PayPal plugin for WordPress is vulnerable to unauthorized order creation in all versions up to, and including, 1.2.3.41. This is due to the plugin exposing a public AJAX endpoint (`wppaypalcheckout_ajax_process_order`) that processes checkout results without any authentication or server-side verification of the PayPal transaction. This makes it possible for unauthenticated attackers to create arbitrary orders on the site with any chosen transaction ID, payment status, product name, amount, or customer information via direct POST requests to the AJAX endpoint, granted they can bypass basic parameter validation. If email sending is enabled, the plugin will also trigger purchase receipt emails to any email address supplied in the request, leading to order database corruption and unauthorized outgoing emails without any real PayPal transaction taking place.

AI-Powered Analysis

AILast updated: 01/24/2026, 19:48:48 UTC

Technical Analysis

CVE-2025-14463 affects the Payment Button for PayPal plugin for WordPress, versions up to and including 1.2.3.41. The vulnerability stems from a publicly accessible AJAX endpoint named `wppaypalcheckout_ajax_process_order` that processes checkout results without any authentication or server-side validation of the PayPal transaction. This lack of authorization (CWE-862) allows unauthenticated attackers to craft POST requests with arbitrary parameters such as transaction ID, payment status, product name, amount, and customer information. Because the plugin does not verify the legitimacy of these transactions with PayPal, attackers can create fake orders that corrupt the order database and trigger purchase receipt emails to any supplied email address if email notifications are enabled. This can lead to unauthorized outgoing emails, potentially facilitating phishing or spam campaigns, and undermines the integrity of the e-commerce system. The vulnerability requires no privileges or user interaction and can be exploited remotely over the network. The CVSS 3.1 base score is 5.3 (medium), reflecting the lack of confidentiality or availability impact but a clear integrity impact. No patches or official fixes are currently linked, and no known exploits have been reported in the wild. The vulnerability was reserved in December 2025 and published in January 2026 by Wordfence.

Potential Impact

For European organizations using WordPress sites with the Payment Button for PayPal plugin, this vulnerability can lead to significant integrity issues in their e-commerce order databases. Attackers can inject fraudulent orders, causing financial reconciliation problems and operational disruptions. The unauthorized sending of purchase receipt emails can damage customer trust, lead to reputational harm, and potentially expose organizations to regulatory scrutiny under GDPR if personal data is mishandled or abused. Additionally, the ability to send arbitrary emails could be leveraged for phishing or social engineering attacks targeting customers or employees. While the vulnerability does not directly impact confidentiality or availability, the indirect effects on business processes and customer relationships can be substantial. Organizations relying on automated order processing and email notifications are particularly vulnerable. The lack of authentication and server-side verification means the attack surface is broad, and exploitation can be automated at scale.

Mitigation Recommendations

European organizations should immediately assess whether they use the Payment Button for PayPal plugin on their WordPress sites and identify the plugin version. If the plugin is in use, the primary mitigation is to disable or uninstall the plugin until a patched version is released. If disabling is not feasible, restrict access to the vulnerable AJAX endpoint (`wppaypalcheckout_ajax_process_order`) by implementing web application firewall (WAF) rules or server-level access controls to allow only trusted IP addresses or authenticated users. Implement server-side validation of PayPal transactions by integrating PayPal's IPN (Instant Payment Notification) or API verification to confirm transaction authenticity before processing orders. Monitor order creation logs for unusual patterns such as a high volume of orders from single IPs or suspicious transaction IDs. Disable email notifications for purchases temporarily to prevent unauthorized emails from being sent. Finally, keep WordPress core and all plugins updated and subscribe to vendor advisories for timely patch releases.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T16:00:08.500Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696b0749b22c7ad868788fcb

Added to database: 1/17/2026, 3:51:37 AM

Last enriched: 1/24/2026, 7:48:48 PM

Last updated: 2/7/2026, 10:38:34 AM

Views: 28

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats