Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14948: CWE-862 Missing Authorization in cyberlord92 miniOrange OTP Verification and SMS Notification for WooCommerce

0
Medium
VulnerabilityCVE-2025-14948cvecve-2025-14948cwe-862
Published: Sat Jan 10 2026 (01/10/2026, 07:03:55 UTC)
Source: CVE Database V5
Vendor/Project: cyberlord92
Product: miniOrange OTP Verification and SMS Notification for WooCommerce

Description

The miniOrange OTP Verification and SMS Notification for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `enable_wc_sms_notification` AJAX action in all versions up to, and including, 4.3.8. This makes it possible for unauthenticated attackers to enable or disable SMS notification settings for WooCommerce orders.

AI-Powered Analysis

AILast updated: 01/10/2026, 07:39:14 UTC

Technical Analysis

The vulnerability identified as CVE-2025-14948 affects the miniOrange OTP Verification and SMS Notification plugin for WooCommerce, a popular WordPress plugin used to add OTP verification and SMS notifications for e-commerce orders. The root cause is a missing authorization (capability) check on the AJAX action 'enable_wc_sms_notification'. This AJAX endpoint is intended to enable or disable SMS notifications for WooCommerce orders. Because the plugin fails to verify whether the requester has the necessary permissions, unauthenticated attackers can invoke this action remotely to alter SMS notification settings without any authentication or user interaction. The impact is limited to integrity, as attackers can modify configuration settings, potentially disrupting order notification workflows and causing confusion or loss of customer trust. The CVSS v3.1 base score is 5.3 (medium severity), reflecting the ease of exploitation (network, no privileges required) but limited impact on confidentiality and availability. The vulnerability affects all versions up to and including 4.3.8, with no patches currently available. No known exploits have been observed in the wild. The vulnerability is classified under CWE-862 (Missing Authorization).

Potential Impact

For European organizations, especially those operating e-commerce platforms using WooCommerce with the miniOrange OTP Verification and SMS Notification plugin, this vulnerability can lead to unauthorized changes in SMS notification settings. This could result in customers not receiving timely order confirmations or updates, potentially damaging customer trust and satisfaction. While the vulnerability does not expose sensitive data or disrupt service availability directly, the manipulation of notification settings can indirectly affect business operations and customer experience. Retailers relying heavily on SMS notifications for order processing and fraud prevention may face operational challenges. Additionally, attackers could leverage this vulnerability as part of a broader attack chain to sow confusion or facilitate social engineering attacks by controlling notification flows. The lack of authentication and ease of exploitation increase the risk for organizations that have not implemented compensating controls.

Mitigation Recommendations

1. Immediately audit and restrict access to the 'enable_wc_sms_notification' AJAX action by implementing proper capability checks within the plugin code or via custom hooks to ensure only authorized users can modify SMS notification settings. 2. If possible, disable the miniOrange OTP Verification and SMS Notification plugin temporarily until a security patch is released. 3. Monitor WooCommerce order notification settings for unauthorized changes and maintain logs of configuration modifications. 4. Employ web application firewalls (WAFs) to detect and block suspicious AJAX requests targeting this endpoint. 5. Keep WordPress core, WooCommerce, and all plugins up to date, and subscribe to vendor security advisories for timely patching once available. 6. Educate administrative users about this vulnerability and encourage strong access controls on WordPress admin accounts. 7. Consider alternative OTP and SMS notification plugins with verified security postures if immediate patching is not feasible.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-19T04:14:38.233Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6961fec8c540fa4b54639bbe

Added to database: 1/10/2026, 7:24:56 AM

Last enriched: 1/10/2026, 7:39:14 AM

Last updated: 1/10/2026, 11:41:39 PM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats