Description
The Cost Calculator Builder plugin for WordPress is vulnerable to Unauthenticated Price Manipulation and Insecure Direct Object Reference (IDOR) in all versions up to, and including, 4.0.1 only when used in combination with Cost Calculator Builder PRO. This is due to the ccb_woocommerce_payment AJAX action being registered via wp_ajax_nopriv, making it accessible to unauthenticated users, and the renderWooCommercePayment() function passing user-controlled data directly to CCBWooCheckout::init() without authorization checks. This makes it possible for unauthenticated attackers to add WooCommerce products to their cart with attacker-controlled prices.
Published: 2026-05-13
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Cost Calculator Builder plugin for WordPress allows unauthenticated users to alter the prices of WooCommerce products before adding them to the cart. The flaw lies in the ccb_woocommerce_payment AJAX action, which is registered for public access via wp_ajax_nopriv and forwards user‑controlled data to the CCBWooCheckout class without any authorization checks. An attacker can therefore manipulate the amount charged to the customer, potentially causing monetary loss or order disputes. Although the vulnerability does not provide remote code execution, it represents a significant authorization bypass that jeopardizes the integrity of the e‑commerce checkout process.

Affected Systems

The flaw affects the WordPress Cost Calculator Builder plugin—styled as Stylemix Cost Calculator Builder—versions up to and including 4.0.1, but only when the free plugin is used together with the Cost Calculator Builder PRO add‑on. Users that have installed either component should verify their plugin versions. The issue is specific to the WordPress environment and involves WooCommerce integration.

Risk and Exploitability

The CVSS score of 5.3 indicates a moderate severity level. EPSS data is not available, and it is not listed in CISA's KEV catalog, suggesting no current widespread exploitation, but the flaw remains publicly known. Attackers only need to send a crafted request to the wp_ajax endpoint, so the attack vector is web‑based and does not require privileged access. Without proper authorization checks, the vulnerability can be exploited by anyone on the internet, posing a direct threat to business revenue and customer trust.

Generated by OpenCVE AI on May 13, 2026 at 05:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Cost Calculator Builder and Cost Calculator Builder PRO to the latest released versions that contain the patch for this IDOR flaw.
  • If an update is not yet available, remove or disable the unwanted wp_ajax_nopriv ccb_woocommerce_payment action so that unauthenticated users cannot reach the vulnerable endpoint.
  • Implement additional access controls at checkout, such as requiring user authentication before adding items to the cart, or sanitizing and validating price values against server‑side product listings before processing the order.

Generated by OpenCVE AI on May 13, 2026 at 05:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 13 May 2026 11:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 13 May 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Stylemixthemes
Stylemixthemes cost Calculator Builder
Wordpress
Wordpress wordpress
Vendors & Products Stylemixthemes
Stylemixthemes cost Calculator Builder
Wordpress
Wordpress wordpress

Wed, 13 May 2026 04:45:00 +0000

Type Values Removed Values Added
Description The Cost Calculator Builder plugin for WordPress is vulnerable to Unauthenticated Price Manipulation and Insecure Direct Object Reference (IDOR) in all versions up to, and including, 4.0.1 only when used in combination with Cost Calculator Builder PRO. This is due to the ccb_woocommerce_payment AJAX action being registered via wp_ajax_nopriv, making it accessible to unauthenticated users, and the renderWooCommercePayment() function passing user-controlled data directly to CCBWooCheckout::init() without authorization checks. This makes it possible for unauthenticated attackers to add WooCommerce products to their cart with attacker-controlled prices.
Title Cost Calculator Builder <= 4.0.1 - Unauthenticated Price Manipulation and Insecure Direct Object Reference
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Stylemixthemes Cost Calculator Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-13T10:23:22.986Z

Reserved: 2025-12-15T21:02:42.851Z

Link: CVE-2025-14755

cve-icon Vulnrichment

Updated: 2026-05-13T10:19:12.336Z

cve-icon NVD

Status : Deferred

Published: 2026-05-13T05:16:12.470

Modified: 2026-05-13T14:43:46.717

Link: CVE-2025-14755

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-13T09:30:25Z

Weaknesses