CVE-2025-14757: CWE-862 Missing Authorization in stylemix Cost Calculator Builder
CVE-2025-14757 is a medium severity vulnerability in the WordPress Cost Calculator Builder plugin (up to version 3. 6. 9) used with its PRO version. It allows unauthenticated attackers to bypass payment status verification and mark orders as paid without actual payment. This occurs because the complete_payment AJAX action is accessible without authentication and only verifies a nonce exposed publicly, lacking checks on user capabilities or order ownership. Exploitation requires no user interaction or privileges, enabling attackers to manipulate order statuses remotely. Although no known exploits are reported in the wild, the vulnerability poses a risk of financial fraud and undermines e-commerce integrity. European organizations using this plugin for online payment processing are at risk of fraudulent transactions and revenue loss. Mitigation involves restricting AJAX action access to authenticated users, validating order ownership, and removing nonce exposure from client-side code. Countries with significant WordPress e-commerce adoption, such as Germany, the UK, France, and the Netherlands, are most likely affected.
AI Analysis
Technical Summary
CVE-2025-14757 is a vulnerability identified in the Cost Calculator Builder WordPress plugin, specifically when used alongside its PRO version, affecting all versions up to and including 3.6.9. The root cause lies in the registration of the complete_payment AJAX action via wp_ajax_nopriv, which allows unauthenticated users to invoke this action. The associated complete() function only validates a nonce, which is publicly exposed in the page source through the JavaScript variable window.ccb_nonces, but does not verify user capabilities or confirm that the order belongs to the requester. This missing authorization (CWE-862) enables any unauthenticated attacker to mark any order's payment status as "completed" without making an actual payment. The vulnerability does not impact confidentiality or availability but compromises the integrity of payment status data, potentially leading to fraudulent order fulfillment and financial loss. The CVSS 3.1 base score is 5.3 (medium), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to integrity. No public exploits have been reported yet, but the vulnerability is straightforward to exploit due to nonce exposure and lack of access control. This flaw is critical for e-commerce sites relying on this plugin for payment processing, as it undermines trust and financial security.
Potential Impact
For European organizations operating e-commerce platforms using the Cost Calculator Builder plugin with the PRO version, this vulnerability can lead to unauthorized manipulation of payment statuses, allowing attackers to fraudulently mark orders as paid. This can result in financial losses due to unfulfilled orders, chargebacks, and reputational damage. The integrity of transaction records is compromised, potentially affecting accounting and compliance processes. Since the vulnerability requires no authentication or user interaction, it can be exploited at scale by automated attacks, increasing risk exposure. Organizations may also face legal and regulatory consequences under European data protection and consumer protection laws if fraudulent transactions occur. The disruption to business operations and customer trust can be significant, especially for SMEs relying heavily on WordPress-based e-commerce solutions.
Mitigation Recommendations
1. Immediately update the Cost Calculator Builder plugin and its PRO version to a patched release once available from the vendor. 2. Until a patch is released, implement server-side access controls to restrict the complete_payment AJAX action to authenticated users only, for example by modifying the plugin code or using WordPress hooks to remove the wp_ajax_nopriv registration. 3. Enhance the complete() function to verify that the user initiating the payment completion owns the order or has appropriate permissions. 4. Remove or obfuscate the exposure of nonces in client-side JavaScript to prevent attackers from easily obtaining them. 5. Monitor order payment status changes for anomalies, such as sudden completions without corresponding payment gateway confirmations. 6. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the vulnerable endpoint. 7. Educate site administrators on the risks and encourage regular plugin updates and security audits. 8. Consider alternative payment verification mechanisms that rely on server-to-server confirmations from payment gateways rather than client-side triggers.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14757: CWE-862 Missing Authorization in stylemix Cost Calculator Builder
Description
CVE-2025-14757 is a medium severity vulnerability in the WordPress Cost Calculator Builder plugin (up to version 3. 6. 9) used with its PRO version. It allows unauthenticated attackers to bypass payment status verification and mark orders as paid without actual payment. This occurs because the complete_payment AJAX action is accessible without authentication and only verifies a nonce exposed publicly, lacking checks on user capabilities or order ownership. Exploitation requires no user interaction or privileges, enabling attackers to manipulate order statuses remotely. Although no known exploits are reported in the wild, the vulnerability poses a risk of financial fraud and undermines e-commerce integrity. European organizations using this plugin for online payment processing are at risk of fraudulent transactions and revenue loss. Mitigation involves restricting AJAX action access to authenticated users, validating order ownership, and removing nonce exposure from client-side code. Countries with significant WordPress e-commerce adoption, such as Germany, the UK, France, and the Netherlands, are most likely affected.
AI-Powered Analysis
Technical Analysis
CVE-2025-14757 is a vulnerability identified in the Cost Calculator Builder WordPress plugin, specifically when used alongside its PRO version, affecting all versions up to and including 3.6.9. The root cause lies in the registration of the complete_payment AJAX action via wp_ajax_nopriv, which allows unauthenticated users to invoke this action. The associated complete() function only validates a nonce, which is publicly exposed in the page source through the JavaScript variable window.ccb_nonces, but does not verify user capabilities or confirm that the order belongs to the requester. This missing authorization (CWE-862) enables any unauthenticated attacker to mark any order's payment status as "completed" without making an actual payment. The vulnerability does not impact confidentiality or availability but compromises the integrity of payment status data, potentially leading to fraudulent order fulfillment and financial loss. The CVSS 3.1 base score is 5.3 (medium), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and impact limited to integrity. No public exploits have been reported yet, but the vulnerability is straightforward to exploit due to nonce exposure and lack of access control. This flaw is critical for e-commerce sites relying on this plugin for payment processing, as it undermines trust and financial security.
Potential Impact
For European organizations operating e-commerce platforms using the Cost Calculator Builder plugin with the PRO version, this vulnerability can lead to unauthorized manipulation of payment statuses, allowing attackers to fraudulently mark orders as paid. This can result in financial losses due to unfulfilled orders, chargebacks, and reputational damage. The integrity of transaction records is compromised, potentially affecting accounting and compliance processes. Since the vulnerability requires no authentication or user interaction, it can be exploited at scale by automated attacks, increasing risk exposure. Organizations may also face legal and regulatory consequences under European data protection and consumer protection laws if fraudulent transactions occur. The disruption to business operations and customer trust can be significant, especially for SMEs relying heavily on WordPress-based e-commerce solutions.
Mitigation Recommendations
1. Immediately update the Cost Calculator Builder plugin and its PRO version to a patched release once available from the vendor. 2. Until a patch is released, implement server-side access controls to restrict the complete_payment AJAX action to authenticated users only, for example by modifying the plugin code or using WordPress hooks to remove the wp_ajax_nopriv registration. 3. Enhance the complete() function to verify that the user initiating the payment completion owns the order or has appropriate permissions. 4. Remove or obfuscate the exposure of nonces in client-side JavaScript to prevent attackers from easily obtaining them. 5. Monitor order payment status changes for anomalies, such as sudden completions without corresponding payment gateway confirmations. 6. Employ web application firewalls (WAFs) with custom rules to detect and block suspicious AJAX requests targeting the vulnerable endpoint. 7. Educate site administrators on the risks and encourage regular plugin updates and security audits. 8. Consider alternative payment verification mechanisms that rely on server-to-server confirmations from payment gateways rather than client-side triggers.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-15T22:56:12.691Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6969fa2a7c726673b6148ccc
Added to database: 1/16/2026, 8:43:22 AM
Last enriched: 1/16/2026, 8:58:20 AM
Last updated: 1/16/2026, 9:20:50 AM
Views: 2
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-60021: CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection') in Apache Software Foundation Apache bRPC
CriticalCVE-2025-12007: CWE-347 Improper Verification of Cryptographic Signature in SMCI X13SEM-F
HighCVE-2025-12006: CWE-347 Improper Verification of Cryptographic Signature in SMCI X12STW-F
HighCVE-2026-22876: Improper limitation of a pathname to a restricted directory ('Path Traversal') in TOA Corporation Multiple Network Cameras TRIFORA 3 series
MediumCVE-2026-20894: Cross-site scripting (XSS) in TOA Corporation Multiple Network Cameras TRIFORA 3 series
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.