Description
The Cost Calculator Builder plugin for WordPress is vulnerable to Unauthenticated Payment Status Bypass in all versions up to, and including, 3.6.9 only when used in combination with Cost Calculator Builder PRO. This is due to the complete_payment AJAX action being registered via wp_ajax_nopriv, making it accessible to unauthenticated users, and the complete() function only verifying a nonce without checking user capabilities or order ownership. Since nonces are exposed to all visitors via window.ccb_nonces in the page source, any unauthenticated attacker can mark any order's payment status as "completed" without actual payment.
Published: 2026-01-16
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized payment status modification leading to fraudulent order fulfillment
Action: Patch Now
AI Analysis

Impact

The Cost Calculator Builder plugin allows unauthenticated users to trigger a complete_payment AJAX action that is registered with wp_ajax_nopriv. The action validates only a publicly exposed nonce and does not verify that the caller has the required capabilities or that the order belongs to the caller. This access control weakness enables any visitor to set any order’s status to "completed" without having performed a payment.

Affected Systems

The vulnerability exists in both the free and PRO editions of the Cost Calculator Builder plugin released by Stylemix for WordPress. All versions up to and including 3.6.9 are affected when the PRO add‑on is present on a site.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The flaw is not listed in the CISA KEV catalog. An attacker can exploit the flaw simply by sending an unauthenticated HTTP request to the wp-admin/admin-ajax.php endpoint with action=complete_payment and a valid nonce, thereby marking orders as paid without authorization. The vulnerability does not enable arbitrary code execution but can result in financial loss and inventory mismanagement.

Generated by OpenCVE AI on April 21, 2026 at 16:20 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Cost Calculator Builder plugin to version 3.7 or newer, which removes the unauthenticated AJAX endpoint.
  • If an immediate update is not possible, modify the plugin to restrict the complete_payment action to logged‑in users and verify that the caller has the necessary capabilities and owns the order before marking it as completed.
  • Apply a web‑application firewall rule that blocks unauthenticated requests to the wp-admin/admin-ajax.php endpoint when the action is complete_payment.
  • Monitor order logs for unexpected status changes and review financial records for irregular payments to detect potential abuse.

Generated by OpenCVE AI on April 21, 2026 at 16:20 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 23 Jan 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:stylemixthemes:cost_calculator_builder:*:*:*:*:free:wordpress:*:*

Fri, 16 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
First Time appeared Stylemixthemes
Stylemixthemes cost Calculator Builder
Wordpress
Wordpress wordpress
Vendors & Products Stylemixthemes
Stylemixthemes cost Calculator Builder
Wordpress
Wordpress wordpress

Fri, 16 Jan 2026 13:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 16 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
Description The Cost Calculator Builder plugin for WordPress is vulnerable to Unauthenticated Payment Status Bypass in all versions up to, and including, 3.6.9 only when used in combination with Cost Calculator Builder PRO. This is due to the complete_payment AJAX action being registered via wp_ajax_nopriv, making it accessible to unauthenticated users, and the complete() function only verifying a nonce without checking user capabilities or order ownership. Since nonces are exposed to all visitors via window.ccb_nonces in the page source, any unauthenticated attacker can mark any order's payment status as "completed" without actual payment.
Title Cost Calculator Builder <= 3.6.9 - Missing Authorization to Unauthenticated Payment Status Bypass
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Stylemixthemes Cost Calculator Builder
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:17:46.406Z

Reserved: 2025-12-15T22:56:12.691Z

Link: CVE-2025-14757

cve-icon Vulnrichment

Updated: 2026-01-16T13:04:48.808Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-16T09:15:59.663

Modified: 2026-01-23T17:12:40.467

Link: CVE-2025-14757

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T16:30:40Z

Weaknesses