Medium severity5.3NVD Advisory· Published Feb 19, 2026· Updated Apr 15, 2026
CVE-2025-14294
CVE-2025-14294
Description
The Razorpay for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the getCouponList() function in all versions up to, and including, 4.7.8. This is due to the checkAuthCredentials() permission callback always returning true, providing no actual authentication. This makes it possible for unauthenticated attackers to modify the billing and shipping contact information (email and phone) of any WooCommerce order by knowing or guessing the order ID.
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- plugins.trac.wordpress.org/browser/woo-razorpay/trunk/includes/api/api.phpnvd
- plugins.trac.wordpress.org/browser/woo-razorpay/trunk/includes/api/auth.phpnvd
- plugins.trac.wordpress.org/browser/woo-razorpay/trunk/includes/api/coupon-get.phpnvd
- plugins.trac.wordpress.org/changesetnvd
- www.wordfence.com/threat-intel/vulnerabilities/id/163d42df-148f-431c-891e-dbdc09bf2ae1nvd
News mentions
0No linked articles in our index yet.