CVE-2025-14948: CWE-862 Missing Authorization in cyberlord92 miniOrange OTP Verification and SMS Notification for WooCommerce
The miniOrange OTP Verification and SMS Notification for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `enable_wc_sms_notification` AJAX action in all versions up to, and including, 4.3.8. This makes it possible for unauthenticated attackers to enable or disable SMS notification settings for WooCommerce orders.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-14948 affects the miniOrange OTP Verification and SMS Notification plugin for WooCommerce, a popular WordPress plugin used to add OTP verification and SMS notifications for e-commerce orders. The root cause is a missing authorization (capability) check on the AJAX action 'enable_wc_sms_notification'. This AJAX endpoint is intended to enable or disable SMS notifications for WooCommerce orders. Because the plugin fails to verify whether the requester has the necessary permissions, unauthenticated attackers can invoke this action remotely to alter SMS notification settings without any authentication or user interaction. The impact is limited to integrity, as attackers can modify configuration settings, potentially disrupting order notification workflows and causing confusion or loss of customer trust. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation (network, no privileges required) but limited impact on confidentiality and availability. The vulnerability affects all versions up to and including 4.3.8, with no patches currently available. No known exploits have been observed in the wild. The vulnerability is classified under CWE-862 (Missing Authorization).
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce with the miniOrange OTP Verification and SMS Notification plugin, this vulnerability can lead to unauthorized changes in SMS notification settings. This could result in customers not receiving timely order confirmations or updates, potentially damaging customer trust and satisfaction. While the vulnerability does not expose sensitive data or disrupt service availability directly, the manipulation of notification settings can indirectly affect business operations and customer experience. Retailers relying heavily on SMS notifications for order processing and fraud prevention may face operational challenges. Additionally, attackers could leverage this vulnerability as part of a broader attack chain to sow confusion or facilitate social engineering attacks by controlling notification flows. The lack of authentication and ease of exploitation increase the risk for organizations that have not implemented compensating controls.
Mitigation Recommendations
1. Immediately audit and restrict access to the 'enable_wc_sms_notification' AJAX action by implementing proper capability checks within the plugin code or via custom hooks to ensure only authorized users can modify SMS notification settings. 2. If possible, disable the miniOrange OTP Verification and SMS Notification plugin temporarily until a security patch is released. 3. Monitor WooCommerce order notification settings for unauthorized changes and maintain logs of configuration modifications. 4. Employ web application firewalls (WAFs) to detect and block suspicious AJAX requests targeting this endpoint. 5. Keep WordPress core, WooCommerce, and all plugins up to date, and subscribe to vendor security advisories for timely patching once available. 6. Educate administrative users about this vulnerability and encourage strong access controls on WordPress admin accounts. 7. Consider alternative OTP and SMS notification plugins with verified security postures if immediate patching is not feasible.
Affected Countries
United Kingdom, Germany, France, Netherlands, Italy, Spain, Sweden
CVE-2025-14948: CWE-862 Missing Authorization in cyberlord92 miniOrange OTP Verification and SMS Notification for WooCommerce
Description
The miniOrange OTP Verification and SMS Notification for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `enable_wc_sms_notification` AJAX action in all versions up to, and including, 4.3.8. This makes it possible for unauthenticated attackers to enable or disable SMS notification settings for WooCommerce orders.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-14948 affects the miniOrange OTP Verification and SMS Notification plugin for WooCommerce, a popular WordPress plugin used to add OTP verification and SMS notifications for e-commerce orders. The root cause is a missing authorization (capability) check on the AJAX action 'enable_wc_sms_notification'. This AJAX endpoint is intended to enable or disable SMS notifications for WooCommerce orders. Because the plugin fails to verify whether the requester has the necessary permissions, unauthenticated attackers can invoke this action remotely to alter SMS notification settings without any authentication or user interaction. The impact is limited to integrity, as attackers can modify configuration settings, potentially disrupting order notification workflows and causing confusion or loss of customer trust. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation (network, no privileges required) but limited impact on confidentiality and availability. The vulnerability affects all versions up to and including 4.3.8, with no patches currently available. No known exploits have been observed in the wild. The vulnerability is classified under CWE-862 (Missing Authorization).
Potential Impact
For European organizations, especially those operating e-commerce platforms using WooCommerce with the miniOrange OTP Verification and SMS Notification plugin, this vulnerability can lead to unauthorized changes in SMS notification settings. This could result in customers not receiving timely order confirmations or updates, potentially damaging customer trust and satisfaction. While the vulnerability does not expose sensitive data or disrupt service availability directly, the manipulation of notification settings can indirectly affect business operations and customer experience. Retailers relying heavily on SMS notifications for order processing and fraud prevention may face operational challenges. Additionally, attackers could leverage this vulnerability as part of a broader attack chain to sow confusion or facilitate social engineering attacks by controlling notification flows. The lack of authentication and ease of exploitation increase the risk for organizations that have not implemented compensating controls.
Mitigation Recommendations
1. Immediately audit and restrict access to the 'enable_wc_sms_notification' AJAX action by implementing proper capability checks within the plugin code or via custom hooks to ensure only authorized users can modify SMS notification settings. 2. If possible, disable the miniOrange OTP Verification and SMS Notification plugin temporarily until a security patch is released. 3. Monitor WooCommerce order notification settings for unauthorized changes and maintain logs of configuration modifications. 4. Employ web application firewalls (WAFs) to detect and block suspicious AJAX requests targeting this endpoint. 5. Keep WordPress core, WooCommerce, and all plugins up to date, and subscribe to vendor security advisories for timely patching once available. 6. Educate administrative users about this vulnerability and encourage strong access controls on WordPress admin accounts. 7. Consider alternative OTP and SMS notification plugins with verified security postures if immediate patching is not feasible.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-19T04:14:38.233Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6961fec8c540fa4b54639bbe
Added to database: 1/10/2026, 7:24:56 AM
Last enriched: 1/10/2026, 7:39:14 AM
Last updated: 1/10/2026, 11:41:39 PM
Views: 21
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-0824: Cross Site Scripting in questdb ui
MediumCVE-2025-13393: CWE-918 Server-Side Request Forgery (SSRF) in marceljm Featured Image from URL (FIFU)
MediumCVE-2025-12379: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in averta Shortcodes and extra features for Phlox theme
MediumCVE-2026-0822: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumCVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.