Description
The Refund Request for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_refund_status' function in all versions up to, and including, 1.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update refund statuses to approved or rejected.
Published: 2025-11-25
Score: 4.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Privilege escalation to modify refund status
Action: Apply Patch
AI Analysis

Impact

The Refund Request for WooCommerce plugin for WordPress contains a missing capability check on the update_refund_status function. As a result, authenticated users with Subscriber-level access and above can change any refund status to approved or rejected. This flaw amounts to a flaw in authorization control, as categorized by CWE‑862, and allows attackers to alter transaction records without proper admin privileges.

Affected Systems

The vulnerability afflicts the sunarc "Refund Request for WooCommerce" plugin for WordPress. All released versions up to and including version 1.0 are affected. The issue resides in the plugin’s logic that processes refund status updates.

Risk and Exploitability

The CVSS score of 4.3 indicates moderate severity, and the EPSS score of less than 1% shows a very low likelihood of exploitation at the time of this analysis. The flaw is not listed in the CISA KEV catalog. A likely attack path requires the attacker to have legitimate login credentials of a Subscriber or higher role, after which the missing authorization check permits misuse of the refund status update endpoint. The risk is confined to administrators who allow Subscriber-level roles the ability to modify refunds, and the impact is the potential for fraudulent refund approvals or denials.

Generated by OpenCVE AI on April 21, 2026 at 01:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Refund Request for WooCommerce plugin to the latest version that includes the authorization check fixation
  • Reconfigure role-based permissions so that Subscriber-level users do not possess the capability to modify refund statuses
  • Audit refund status logs for unauthorized changes and investigate any anomalies

Generated by OpenCVE AI on April 21, 2026 at 01:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 01 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Sunarc
Sunarc refund Request For Woocommerce
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Sunarc
Sunarc refund Request For Woocommerce
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress

Tue, 25 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 25 Nov 2025 07:45:00 +0000

Type Values Removed Values Added
Description The Refund Request for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'update_refund_status' function in all versions up to, and including, 1.0. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update refund statuses to approved or rejected.
Title Refund Request for WooCommerce <= 1.0 - Missing Authorization to Authenticated (Subscriber+) Refund Status Update
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 4.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Sunarc Refund Request For Woocommerce
Woocommerce Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:32:26.856Z

Reserved: 2025-11-03T15:01:40.163Z

Link: CVE-2025-12634

cve-icon Vulnrichment

Updated: 2025-11-25T14:27:07.386Z

cve-icon NVD

Status : Deferred

Published: 2025-11-25T08:15:49.093

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12634

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:30:24Z

Weaknesses