Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Enartia
Enartia piraeus Bank Woocommerce Payment Gateway Wordpress Wordpress wordpress |
|
| Vendors & Products |
Enartia
Enartia piraeus Bank Woocommerce Payment Gateway Wordpress Wordpress wordpress |
Wed, 07 Jan 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 07 Jan 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Piraeus Bank WooCommerce Payment Gateway plugin for WordPress is vulnerable to unauthorized order status modification in all versions up to, and including, 3.1.4. This is due to missing authorization checks on the payment callback endpoint handler when processing the 'fail' callback from the payment gateway. This makes it possible for unauthenticated attackers to change any order's status to 'failed' via the publicly accessible WooCommerce API endpoint by providing only the order ID (MerchantReference parameter), which can be easily enumerated as order IDs are sequential integers. This can cause significant business disruption including canceled shipments, inventory issues, and loss of revenue. | |
| Title | Piraeus Bank WooCommerce Payment Gateway <= 3.1.4 - Missing Authorization to Unauthenticated Arbitrary Order Status Change | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-01-07T14:49:41.847Z
Reserved: 2025-12-10T15:56:31.158Z
Link: CVE-2025-14460
Updated: 2026-01-07T14:49:37.801Z
Status : Received
Published: 2026-01-07T12:16:54.903
Modified: 2026-01-07T12:16:54.903
Link: CVE-2025-14460
No data.
OpenCVE Enrichment
Updated: 2026-01-08T09:49:59Z