Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14843: CWE-862 Missing Authorization in wizit Wizit Gateway for WooCommerce

0
Medium
VulnerabilityCVE-2025-14843cvecve-2025-14843cwe-862
Published: Sat Jan 24 2026 (01/24/2026, 07:26:46 UTC)
Source: CVE Database V5
Vendor/Project: wizit
Product: Wizit Gateway for WooCommerce

Description

The Wizit Gateway for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Arbitrary Order Cancellation in all versions up to, and including, 1.2.9. This is due to a lack of authentication and authorization checks in the 'handle_checkout_redirecturl_response' function. This makes it possible for unauthenticated attackers to cancel arbitrary WooCommerce orders by sending a crafted request with a valid order ID.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 11:37:57 UTC

Technical Analysis

CVE-2025-14843 identifies a missing authorization vulnerability (CWE-862) in the Wizit Gateway for WooCommerce plugin for WordPress, present in all versions up to and including 1.2.9. The flaw resides in the 'handle_checkout_redirecturl_response' function, which processes order-related requests without verifying the authenticity or authorization of the requester. This lack of access control allows unauthenticated attackers to send crafted HTTP requests containing valid WooCommerce order IDs to cancel arbitrary orders. The vulnerability does not require any user interaction or prior authentication, making it remotely exploitable over the network. The impact is limited to integrity, as attackers can disrupt order processing by canceling legitimate orders, potentially causing financial loss and customer dissatisfaction. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation and limited scope of impact (no confidentiality or availability loss). No patches or official fixes have been published yet, and no known exploits are reported in the wild. This vulnerability is particularly concerning for e-commerce sites relying on the Wizit Gateway plugin, as it undermines trust in order management and could be leveraged for fraud or denial of service against order fulfillment.

Potential Impact

The primary impact of this vulnerability is on the integrity of e-commerce order data. Unauthorized cancellation of orders can lead to financial losses for merchants due to disrupted sales and potential chargebacks. Customers may experience confusion and dissatisfaction if their orders are canceled without their consent, damaging brand reputation. Although confidentiality and availability are not directly affected, the disruption to order processing workflows can indirectly impact business operations and customer trust. The ease of exploitation—requiring no authentication or user interaction—means attackers can automate attacks at scale, targeting multiple orders across vulnerable sites. This could also be used as part of larger fraud schemes or to cause operational disruptions. Organizations relying on the Wizit Gateway for WooCommerce must consider the risk of unauthorized order manipulation and potential downstream effects on supply chain and customer relations.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement strict authorization checks within the 'handle_checkout_redirecturl_response' function or equivalent order cancellation handlers to ensure only authenticated and authorized users can cancel orders. Until an official patch is released, applying Web Application Firewall (WAF) rules to detect and block suspicious requests containing order cancellation parameters from unauthenticated sources is recommended. Monitoring WooCommerce order cancellation logs for unusual patterns or spikes in cancellations can help detect exploitation attempts early. Additionally, limiting access to order management endpoints by IP whitelisting or requiring authentication tokens can reduce exposure. Organizations should also keep the Wizit Gateway plugin updated and subscribe to vendor advisories for forthcoming patches. Conducting security reviews of all third-party plugins and minimizing the use of unnecessary plugins reduces attack surface. Finally, educating staff and customers about potential fraudulent order cancellations can help in early detection and response.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-17T18:02:47.010Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6974765d4623b1157ca738f0

Added to database: 1/24/2026, 7:35:57 AM

Last enriched: 2/27/2026, 11:37:57 AM

Last updated: 3/25/2026, 7:09:18 AM

Views: 44

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses