CVE-2025-14463
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2026-01-17

Last updated on: 2026-01-17

Assigner: Wordfence

Description
The Payment Button for PayPal plugin for WordPress is vulnerable to unauthorized order creation in all versions up to, and including, 1.2.3.41. This is due to the plugin exposing a public AJAX endpoint (`wppaypalcheckout_ajax_process_order`) that processes checkout results without any authentication or server-side verification of the PayPal transaction. This makes it possible for unauthenticated attackers to create arbitrary orders on the site with any chosen transaction ID, payment status, product name, amount, or customer information via direct POST requests to the AJAX endpoint, granted they can bypass basic parameter validation. If email sending is enabled, the plugin will also trigger purchase receipt emails to any email address supplied in the request, leading to order database corruption and unauthorized outgoing emails without any real PayPal transaction taking place.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-17
Last Modified
2026-01-17
Generated
2026-05-07
AI Q&A
2026-01-18
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
unknown_vendor wp_paypal 1.2.3.41
unknown_vendor wp_paypal 1.2.3.42
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The vulnerability in the Payment Button for PayPal WordPress plugin (up to version 1.2.3.41) allows unauthenticated attackers to create arbitrary orders on the site by exploiting a public AJAX endpoint (`wppaypalcheckout_ajax_process_order`). This endpoint processes checkout results without any authentication or server-side verification of the PayPal transaction. Attackers can send direct POST requests with chosen transaction IDs, payment statuses, product names, amounts, or customer information, bypassing basic parameter validation. If email sending is enabled, the plugin will send purchase receipt emails to any supplied email address, causing order database corruption and unauthorized outgoing emails without any real PayPal transaction occurring. [2]


How can this vulnerability impact me? :

This vulnerability can impact you by allowing attackers to create fake orders on your WordPress site without making actual payments. This can lead to corruption of your order database, unauthorized sending of purchase receipt emails to arbitrary email addresses, and potential confusion or distrust from customers. It may also cause administrative overhead to identify and remove fraudulent orders and could be exploited to manipulate sales data or trigger unwanted email traffic. [2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for unauthorized POST requests to the AJAX endpoint `admin-ajax.php` with the action parameter `wppaypalcheckout_ajax_process_order`. Specifically, look for POST requests that attempt to create orders without proper authentication or with arbitrary transaction IDs and payment details. Network or web server logs can be searched for such suspicious requests. For example, using command-line tools on the server hosting the WordPress site, you can run commands like: 1. To search Apache or Nginx access logs for suspicious POST requests: `grep 'POST.*admin-ajax.php' /var/log/apache2/access.log | grep 'wppaypalcheckout_ajax_process_order'` 2. To detect unusual or repeated order creation attempts with arbitrary transaction IDs: `grep 'wppaypalcheckout_ajax_process_order' /var/log/apache2/access.log | awk '{print $0}' | grep -i 'transaction_id'` 3. Use intrusion detection systems or web application firewalls to alert on unauthenticated POST requests to this AJAX endpoint. Additionally, monitoring outgoing emails for unexpected purchase receipt emails can indicate exploitation attempts. Note: The exact commands depend on your server setup and log file locations. [2, 3]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1. Update the WP PayPal plugin to version 1.2.3.42 or later, where the vulnerability is fixed by implementing proper authentication, server-side validation, and sanitization of AJAX requests as described in the changeset. 2. If updating immediately is not possible, restrict access to the AJAX endpoint `admin-ajax.php` for unauthenticated users or implement firewall rules to block suspicious POST requests targeting the `wppaypalcheckout_ajax_process_order` action. 3. Disable email sending for purchase receipts temporarily to prevent unauthorized outgoing emails. 4. Review and tighten WordPress user permissions to limit who can trigger AJAX order processing. 5. Monitor logs for suspicious activity as a temporary detection measure. 6. Apply any available patches or security configurations recommended by the plugin maintainers. Updating the plugin is the most effective and recommended step to fully mitigate the vulnerability. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart