Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-49339: CWE-862 Missing Authorization in Digages Direct Payments WP

0
Medium
VulnerabilityCVE-2025-49339cvecve-2025-49339cwe-862
Published: Wed Dec 31 2025 (12/31/2025, 16:31:22 UTC)
Source: CVE Database V5
Vendor/Project: Digages
Product: Direct Payments WP

Description

Missing Authorization vulnerability in Digages Direct Payments WP allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Direct Payments WP: from n/a through 1.3.0.

AI-Powered Analysis

AILast updated: 12/31/2025, 17:01:08 UTC

Technical Analysis

CVE-2025-49339 is a vulnerability categorized under CWE-862 (Missing Authorization) found in the Digages Direct Payments WP plugin for WordPress, affecting versions up to 1.3.0. The vulnerability stems from improperly configured access control mechanisms within the plugin, which allow users with limited privileges (PR:L) to execute actions that should be restricted. Specifically, the plugin fails to enforce proper authorization checks on certain functions related to payment processing, potentially enabling unauthorized users to manipulate payment data or perform unauthorized operations. The CVSS 3.1 base score is 4.3 (medium), reflecting that the attack vector is network-based (AV:N), requires low attack complexity (AC:L), and privileges (PR:L) but no user interaction (UI:N). The impact is limited to integrity (I:L), with no direct confidentiality or availability impact. No known exploits have been reported in the wild, and no patches have been released at the time of publication. This vulnerability could be exploited by authenticated users with limited privileges, such as low-level administrators or contributors, to escalate their capabilities within the payment system. Given the plugin’s role in handling direct payments on WordPress sites, exploitation could lead to unauthorized payment manipulations or fraudulent transactions, undermining trust and financial integrity.

Potential Impact

For European organizations, especially those operating e-commerce platforms or payment processing websites using WordPress with the Digages Direct Payments WP plugin, this vulnerability poses a risk to the integrity of payment transactions. Unauthorized users with limited privileges could exploit the missing authorization to alter payment details, potentially leading to financial fraud, inaccurate transaction records, or unauthorized fund transfers. While confidentiality and availability are not directly impacted, the integrity compromise could result in financial losses, reputational damage, and regulatory scrutiny under GDPR and other financial compliance frameworks. The risk is heightened for organizations with multiple user roles and complex permission structures, where privilege misconfigurations are more likely. Additionally, organizations in sectors with high transaction volumes or sensitive financial data are at greater risk of exploitation consequences.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit the access control configurations of the Digages Direct Payments WP plugin and restrict user roles to the minimum necessary privileges. Implement strict role-based access control (RBAC) policies to ensure that only trusted users can perform payment-related actions. Monitor logs for unusual activities related to payment processing functions. Since no official patch is available, consider temporarily disabling the plugin or replacing it with alternative payment processing solutions until a secure update is released. Engage with the vendor for updates and apply patches promptly once available. Additionally, conduct regular security assessments and penetration testing focused on authorization controls within WordPress plugins. Employ web application firewalls (WAFs) with custom rules to detect and block unauthorized attempts to access restricted payment functions.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-06-04T09:42:27.086Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695552dadb813ff03ef39002

Added to database: 12/31/2025, 4:44:10 PM

Last enriched: 12/31/2025, 5:01:08 PM

Last updated: 1/7/2026, 4:12:37 AM

Views: 10

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats