CVE-2025-14978: CWE-862 Missing Authorization in peachpay PeachPay — Payments & Express Checkout for WooCommerce (supports Stripe, PayPal, Square, Authorize.net)
CVE-2025-14978 is a medium-severity vulnerability in the PeachPay plugin for WooCommerce that allows unauthenticated attackers to modify the status of arbitrary orders via a missing authorization check on the ConvesioPay webhook REST endpoint. This flaw affects all versions up to 1. 119. 8 and requires no user interaction or authentication to exploit. While it does not impact confidentiality or availability, it compromises the integrity of order data, potentially enabling fraudulent order status changes. No known exploits are currently reported in the wild. European organizations using WooCommerce with PeachPay for payment processing should prioritize patching or mitigating this vulnerability to prevent unauthorized order manipulation. Countries with high WooCommerce adoption and e-commerce activity, such as Germany, the UK, and France, are most likely to be affected. Immediate mitigation includes restricting access to the webhook endpoint, monitoring order status changes, and applying updates once available.
AI Analysis
Technical Summary
The vulnerability identified as CVE-2025-14978 affects the PeachPay — Payments & Express Checkout plugin for WooCommerce, which integrates multiple payment gateways including Stripe, PayPal, Square, and Authorize.net. The root cause is a missing authorization check (CWE-862) on the ConvesioPay webhook REST endpoint, allowing unauthenticated attackers to send crafted requests that modify the status of arbitrary WooCommerce orders. This flaw exists in all versions up to and including 1.119.8. Because the endpoint lacks capability checks, attackers can bypass authentication and authorization mechanisms, directly impacting order integrity. The vulnerability has a CVSS 3.1 base score of 5.3 (medium severity), reflecting its network attack vector, low complexity, no privileges required, and no user interaction needed. The impact is limited to integrity, with no direct confidentiality or availability consequences. No public exploits have been reported yet, but the potential for fraudulent order manipulation or disruption of business processes is significant. The vulnerability was published on January 20, 2026, and no patches are currently linked, indicating that users must implement interim mitigations. The affected plugin is widely used in e-commerce environments, making this a relevant threat to online retailers relying on WooCommerce and PeachPay for payment processing.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity of e-commerce transactions processed via WooCommerce sites using the PeachPay plugin. Attackers could manipulate order statuses, potentially causing financial discrepancies, fulfillment errors, or fraudulent order processing. This could lead to financial losses, reputational damage, and customer trust erosion. Since payment gateways like Stripe, PayPal, Square, and Authorize.net are involved, unauthorized order status changes might also complicate payment reconciliation and dispute resolution. The impact is particularly critical for businesses with high transaction volumes or those operating in regulated sectors requiring strict transaction integrity. Additionally, attackers could exploit this flaw to disrupt supply chains or inventory management by triggering false order completions or cancellations. Although no confidentiality breach occurs, the integrity compromise can indirectly affect compliance with data protection and financial regulations. The lack of authentication requirement increases the attack surface, making it easier for remote attackers to exploit without insider access or user interaction.
Mitigation Recommendations
1. Immediately restrict access to the ConvesioPay webhook REST endpoint by implementing IP whitelisting to allow only trusted payment gateway IP addresses. 2. Deploy web application firewall (WAF) rules to detect and block unauthorized requests targeting the webhook endpoint. 3. Monitor WooCommerce order status changes closely for unusual patterns or spikes that could indicate exploitation attempts. 4. Implement additional server-side validation to verify the authenticity of webhook requests, such as validating signatures or tokens provided by payment gateways. 5. Disable or temporarily deactivate the PeachPay plugin if feasible until an official patch is released. 6. Engage with the plugin vendor or community to obtain updates or patches as soon as they become available. 7. Educate e-commerce and IT teams about this vulnerability to increase awareness and readiness to respond to suspicious activity. 8. Review and enhance logging around order management and webhook interactions to support forensic investigations if exploitation occurs.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-14978: CWE-862 Missing Authorization in peachpay PeachPay — Payments & Express Checkout for WooCommerce (supports Stripe, PayPal, Square, Authorize.net)
Description
CVE-2025-14978 is a medium-severity vulnerability in the PeachPay plugin for WooCommerce that allows unauthenticated attackers to modify the status of arbitrary orders via a missing authorization check on the ConvesioPay webhook REST endpoint. This flaw affects all versions up to 1. 119. 8 and requires no user interaction or authentication to exploit. While it does not impact confidentiality or availability, it compromises the integrity of order data, potentially enabling fraudulent order status changes. No known exploits are currently reported in the wild. European organizations using WooCommerce with PeachPay for payment processing should prioritize patching or mitigating this vulnerability to prevent unauthorized order manipulation. Countries with high WooCommerce adoption and e-commerce activity, such as Germany, the UK, and France, are most likely to be affected. Immediate mitigation includes restricting access to the webhook endpoint, monitoring order status changes, and applying updates once available.
AI-Powered Analysis
Technical Analysis
The vulnerability identified as CVE-2025-14978 affects the PeachPay — Payments & Express Checkout plugin for WooCommerce, which integrates multiple payment gateways including Stripe, PayPal, Square, and Authorize.net. The root cause is a missing authorization check (CWE-862) on the ConvesioPay webhook REST endpoint, allowing unauthenticated attackers to send crafted requests that modify the status of arbitrary WooCommerce orders. This flaw exists in all versions up to and including 1.119.8. Because the endpoint lacks capability checks, attackers can bypass authentication and authorization mechanisms, directly impacting order integrity. The vulnerability has a CVSS 3.1 base score of 5.3 (medium severity), reflecting its network attack vector, low complexity, no privileges required, and no user interaction needed. The impact is limited to integrity, with no direct confidentiality or availability consequences. No public exploits have been reported yet, but the potential for fraudulent order manipulation or disruption of business processes is significant. The vulnerability was published on January 20, 2026, and no patches are currently linked, indicating that users must implement interim mitigations. The affected plugin is widely used in e-commerce environments, making this a relevant threat to online retailers relying on WooCommerce and PeachPay for payment processing.
Potential Impact
For European organizations, this vulnerability poses a risk to the integrity of e-commerce transactions processed via WooCommerce sites using the PeachPay plugin. Attackers could manipulate order statuses, potentially causing financial discrepancies, fulfillment errors, or fraudulent order processing. This could lead to financial losses, reputational damage, and customer trust erosion. Since payment gateways like Stripe, PayPal, Square, and Authorize.net are involved, unauthorized order status changes might also complicate payment reconciliation and dispute resolution. The impact is particularly critical for businesses with high transaction volumes or those operating in regulated sectors requiring strict transaction integrity. Additionally, attackers could exploit this flaw to disrupt supply chains or inventory management by triggering false order completions or cancellations. Although no confidentiality breach occurs, the integrity compromise can indirectly affect compliance with data protection and financial regulations. The lack of authentication requirement increases the attack surface, making it easier for remote attackers to exploit without insider access or user interaction.
Mitigation Recommendations
1. Immediately restrict access to the ConvesioPay webhook REST endpoint by implementing IP whitelisting to allow only trusted payment gateway IP addresses. 2. Deploy web application firewall (WAF) rules to detect and block unauthorized requests targeting the webhook endpoint. 3. Monitor WooCommerce order status changes closely for unusual patterns or spikes that could indicate exploitation attempts. 4. Implement additional server-side validation to verify the authenticity of webhook requests, such as validating signatures or tokens provided by payment gateways. 5. Disable or temporarily deactivate the PeachPay plugin if feasible until an official patch is released. 6. Engage with the plugin vendor or community to obtain updates or patches as soon as they become available. 7. Educate e-commerce and IT teams about this vulnerability to increase awareness and readiness to respond to suspicious activity. 8. Review and enhance logging around order management and webhook interactions to support forensic investigations if exploitation occurs.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-12-19T16:06:55.163Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 696edf804623b1157ce5dbe8
Added to database: 1/20/2026, 1:50:56 AM
Last enriched: 1/27/2026, 8:20:45 PM
Last updated: 2/7/2026, 10:06:06 AM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2080: Command Injection in UTT HiPER 810
HighCVE-2026-2079: Improper Authorization in yeqifu warehouse
MediumCVE-2026-1675: CWE-1188 Initialization of a Resource with an Insecure Default in brstefanovic Advanced Country Blocker
MediumCVE-2026-1643: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in ariagle MP-Ukagaka
MediumCVE-2026-1634: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in alexdtn Subitem AL Slider
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.