CVE-2025-14948: CWE-862 Missing Authorization in cyberlord92 miniOrange OTP Verification and SMS Notification for WooCommerce
The miniOrange OTP Verification and SMS Notification for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `enable_wc_sms_notification` AJAX action in all versions up to, and including, 4.3.8. This makes it possible for unauthenticated attackers to enable or disable SMS notification settings for WooCommerce orders.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-14948 affects the miniOrange OTP Verification and SMS Notification plugin for WooCommerce, a popular WordPress e-commerce extension. The root cause is a missing authorization (capability) check on the AJAX action 'enable_wc_sms_notification', which controls enabling or disabling SMS notifications for WooCommerce orders. This flaw allows unauthenticated attackers to send crafted AJAX requests to toggle SMS notification settings without any user authentication or interaction. Although the vulnerability does not allow direct access to sensitive data or disruption of service, it permits unauthorized modification of plugin settings, undermining the integrity of order notification processes. This could lead to missed or altered customer notifications, potentially impacting order fulfillment and customer trust. The vulnerability affects all versions up to and including 4.3.8, with no patches currently available. The CVSS score is 5.3 (medium), reflecting network attack vector, no privileges required, and no user interaction needed. No known exploits have been reported in the wild, but the ease of exploitation and the widespread use of WooCommerce in e-commerce make this a relevant threat. The vulnerability is classified under CWE-862 (Missing Authorization), emphasizing the lack of proper access control on critical plugin functionality.
Potential Impact
For European organizations relying on WooCommerce for e-commerce operations, this vulnerability could lead to unauthorized changes in SMS notification settings, disrupting customer communication workflows. Although it does not expose sensitive data or cause denial of service, the integrity of order notifications is compromised, which may result in customers not receiving timely updates about their orders or receiving incorrect notifications. This can degrade customer experience, reduce trust, and potentially impact sales and brand reputation. Organizations with high transaction volumes or those that rely heavily on SMS notifications for order confirmations and updates are particularly vulnerable. Additionally, attackers could leverage this vulnerability as part of a broader attack chain to cause confusion or facilitate social engineering attacks. The lack of authentication requirement increases the risk of automated exploitation attempts. However, the absence of known exploits in the wild and the medium severity rating suggest the threat is moderate but should not be ignored.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify if the miniOrange OTP Verification and SMS Notification plugin is in use, particularly versions up to 4.3.8. Until an official patch is released, administrators should consider disabling the vulnerable plugin or restricting access to the affected AJAX endpoint via web application firewall (WAF) rules that block unauthenticated requests targeting 'enable_wc_sms_notification'. Implementing custom code to add capability checks on the AJAX action can serve as an interim fix. Monitoring logs for unusual or unauthorized changes to SMS notification settings is critical to detect exploitation attempts early. Organizations should also ensure that WordPress and WooCommerce installations are kept up to date and subscribe to vendor security advisories for timely patch deployment. Finally, educating staff about potential phishing or social engineering attacks that could leverage notification disruptions will help mitigate secondary risks.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland
CVE-2025-14948: CWE-862 Missing Authorization in cyberlord92 miniOrange OTP Verification and SMS Notification for WooCommerce
Description
The miniOrange OTP Verification and SMS Notification for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the `enable_wc_sms_notification` AJAX action in all versions up to, and including, 4.3.8. This makes it possible for unauthenticated attackers to enable or disable SMS notification settings for WooCommerce orders.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-14948 affects the miniOrange OTP Verification and SMS Notification plugin for WooCommerce, a popular WordPress e-commerce extension. The root cause is a missing authorization (capability) check on the AJAX action 'enable_wc_sms_notification', which controls enabling or disabling SMS notifications for WooCommerce orders. This flaw allows unauthenticated attackers to send crafted AJAX requests to toggle SMS notification settings without any user authentication or interaction. Although the vulnerability does not allow direct access to sensitive data or disruption of service, it permits unauthorized modification of plugin settings, undermining the integrity of order notification processes. This could lead to missed or altered customer notifications, potentially impacting order fulfillment and customer trust. The vulnerability affects all versions up to and including 4.3.8, with no patches currently available. The CVSS score is 5.3 (medium), reflecting network attack vector, no privileges required, and no user interaction needed. No known exploits have been reported in the wild, but the ease of exploitation and the widespread use of WooCommerce in e-commerce make this a relevant threat. The vulnerability is classified under CWE-862 (Missing Authorization), emphasizing the lack of proper access control on critical plugin functionality.
Potential Impact
For European organizations relying on WooCommerce for e-commerce operations, this vulnerability could lead to unauthorized changes in SMS notification settings, disrupting customer communication workflows. Although it does not expose sensitive data or cause denial of service, the integrity of order notifications is compromised, which may result in customers not receiving timely updates about their orders or receiving incorrect notifications. This can degrade customer experience, reduce trust, and potentially impact sales and brand reputation. Organizations with high transaction volumes or those that rely heavily on SMS notifications for order confirmations and updates are particularly vulnerable. Additionally, attackers could leverage this vulnerability as part of a broader attack chain to cause confusion or facilitate social engineering attacks. The lack of authentication requirement increases the risk of automated exploitation attempts. However, the absence of known exploits in the wild and the medium severity rating suggest the threat is moderate but should not be ignored.
Mitigation Recommendations
European organizations should immediately audit their WooCommerce installations to identify if the miniOrange OTP Verification and SMS Notification plugin is in use, particularly versions up to 4.3.8. Until an official patch is released, administrators should consider disabling the vulnerable plugin or restricting access to the affected AJAX endpoint via web application firewall (WAF) rules that block unauthenticated requests targeting 'enable_wc_sms_notification'. Implementing custom code to add capability checks on the AJAX action can serve as an interim fix. Monitoring logs for unusual or unauthorized changes to SMS notification settings is critical to detect exploitation attempts early. Organizations should also ensure that WordPress and WooCommerce installations are kept up to date and subscribe to vendor security advisories for timely patch deployment. Finally, educating staff about potential phishing or social engineering attacks that could leverage notification disruptions will help mitigate secondary risks.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-19T04:14:38.233Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6961fec8c540fa4b54639bbe
Added to database: 1/10/2026, 7:24:56 AM
Last enriched: 1/17/2026, 8:01:30 AM
Last updated: 2/7/2026, 9:28:44 AM
Views: 77
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.