Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14463: CWE-862 Missing Authorization in naa986 Payment Button for PayPal

0
Medium
VulnerabilityCVE-2025-14463cvecve-2025-14463cwe-862
Published: Sat Jan 17 2026 (01/17/2026, 03:24:24 UTC)
Source: CVE Database V5
Vendor/Project: naa986
Product: Payment Button for PayPal

Description

CVE-2025-14463 is a medium-severity vulnerability in the Payment Button for PayPal WordPress plugin (all versions up to 1. 2. 3. 41). It allows unauthenticated attackers to create arbitrary orders by exploiting a public AJAX endpoint that lacks proper authorization and server-side transaction verification. Attackers can submit arbitrary transaction details, causing unauthorized order creation, database corruption, and triggering fraudulent purchase receipt emails. No authentication or user interaction is required, and the vulnerability impacts the integrity of order data without affecting confidentiality or availability. There are no known exploits in the wild yet, but the vulnerability poses a risk to e-commerce sites using this plugin. Mitigation requires disabling the plugin or implementing server-side verification and authentication on the AJAX endpoint. European organizations running WordPress sites with this plugin are at risk, especially in countries with high WordPress usage and e-commerce activity such as Germany, the UK, France, and the Netherlands.

AI-Powered Analysis

AILast updated: 01/17/2026, 04:06:33 UTC

Technical Analysis

The Payment Button for PayPal plugin for WordPress suffers from a missing authorization vulnerability (CWE-862) identified as CVE-2025-14463. The plugin exposes a public AJAX endpoint named `wppaypalcheckout_ajax_process_order` that processes checkout results without any authentication or server-side verification of the PayPal transaction. This design flaw allows unauthenticated attackers to send crafted POST requests directly to this endpoint, specifying arbitrary transaction IDs, payment statuses, product names, amounts, and customer information. Because the plugin does not verify the legitimacy of the PayPal transaction server-side, attackers can create fake orders on the victim's site. Additionally, if email notifications are enabled, the plugin will send purchase receipt emails to any email address supplied in the request, enabling potential phishing or spam campaigns and causing order database corruption. The vulnerability affects all versions up to and including 1.2.3.41. The CVSS v3.1 base score is 5.3 (medium), reflecting the ease of exploitation (no authentication or user interaction required) but limited impact on confidentiality and availability. No patches or fixes have been published yet, and no known exploits are reported in the wild. The vulnerability primarily compromises data integrity by allowing unauthorized order creation and fraudulent email dispatch.

Potential Impact

For European organizations, especially those operating e-commerce websites using WordPress with the Payment Button for PayPal plugin, this vulnerability can lead to significant operational and reputational damage. Unauthorized order creation can corrupt sales data, complicate inventory and financial reconciliation, and potentially trigger fraudulent chargebacks if attackers use real payment information. The ability to send arbitrary purchase receipt emails can be abused for phishing campaigns targeting customers or internal staff, increasing the risk of credential theft or malware infection. Although the vulnerability does not directly expose confidential data or cause service outages, the integrity compromise can undermine customer trust and lead to financial losses. Organizations with high transaction volumes or those in regulated sectors (e.g., retail, finance) may face compliance issues if fraudulent transactions are not detected promptly. The lack of authentication and server-side validation makes exploitation straightforward, increasing the risk of automated attacks. The impact is more pronounced in countries with widespread WordPress adoption and significant e-commerce activity.

Mitigation Recommendations

Immediate mitigation steps include disabling the Payment Button for PayPal plugin until a secure update is available. Organizations should audit their WordPress installations to identify affected versions and remove or replace the plugin with alternatives that implement proper authorization and transaction verification. If disabling the plugin is not feasible, implement web application firewall (WAF) rules to block unauthorized POST requests to the `wppaypalcheckout_ajax_process_order` endpoint, restricting access to trusted IP addresses or authenticated users only. Additionally, monitor order creation logs for suspicious patterns such as unusual transaction IDs or customer data. Review and tighten email sending configurations to prevent abuse of the receipt email functionality. Developers should update the plugin code to enforce server-side verification of PayPal transactions using PayPal's API and require authentication for order processing endpoints. Regularly update WordPress and plugins to the latest versions and conduct security audits focusing on e-commerce workflows. Educate staff to recognize phishing attempts potentially stemming from this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-10T16:00:08.500Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696b0749b22c7ad868788fcb

Added to database: 1/17/2026, 3:51:37 AM

Last enriched: 1/17/2026, 4:06:33 AM

Last updated: 1/17/2026, 4:54:06 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats