Description
The Dokan: AI Powered WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 4.2.4 via the `/wp-json/dokan/v1/settings` REST API endpoint due to missing validation on a user-controlled key. This makes it possible for authenticated attackers, with customer-level permissions and above, to read or modify other vendors' store settings including sensitive payment information (PayPal email, bank account details, routing numbers, IBAN, SWIFT codes), phone numbers, and addresses, and change PayPal email addresses to attacker-controlled addresses, enabling financial theft when the marketplace processes payouts.
Published: 2026-01-20
Score: 8.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Data integrity and confidentiality breach, possible PayPal account takeover and financial theft
Action: Immediate Patch
AI Analysis

Impact

This vulnerability arises from an insecure direct object reference in the Dokan plugin’s REST API endpoint /wp-json/dokan/v1/settings, where a user-controlled key is not validated. An authenticated user with customer-level or higher permissions can read or modify any vendor’s store settings, including payment information such as PayPal email, bank account numbers, routing numbers, IBAN, SWIFT, phone and address details. The attacker can change the PayPal email to a malicious address, enabling the marketplace to route payouts to the attacker’s account. This results in both disclosure of sensitive financial data and potential diversion of payments to an unauthorized account.

Affected Systems

The vulnerability affects the Dokan: AI Powered WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy plugin for WordPress in all releases up to and including version 4.2.4. The CMS context is WordPress, and the affected component is the Dokan REST API handling vendor settings.

Risk and Exploitability

The CVSS score of 8.1 indicates a high severity. The EPSS score of less than 1% suggests that widespread exploitation is currently unlikely, however the requirement for authenticated access means that attackers who compromise vendor credentials or create new accounts with sufficient permissions could exploit the flaw. The vulnerability is not listed in CISA's KEV catalog, so no public exploitation case has been reported yet. Given the potential for financial theft and broad access to sensitive information, it poses a significant risk to merchants and their customers. The likely attack path involves an attacker gaining legitimate vendor credentials or creating a vendor account, then calling the vulnerable REST endpoint to retrieve or alter another vendor’s configuration. The missing validation on the key parameter allows the attacker to specify any vendor ID, bypassing intended access controls. Overall, while exploitation probability is low at present, the high impact on money‑related data warrants immediate attention.

Generated by OpenCVE AI on April 21, 2026 at 16:15 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Dokan plugin to the latest available version (v4.2.5 or later) where this flaw has been fixed.
  • If an upgrade is not immediately possible, restrict vendor user roles to the minimum permissions required for their tasks; avoid giving customer-level rights to accounts that do not need them.
  • Patch the API endpoint by adding validation to ensure that the key parameter can only reference the authenticated vendor’s own store settings; if necessary for regression, temporarily block the related REST route for unauthenticated or low‑privilege users.
  • Regularly review and rotate vendor account credentials and enforce strong password policies.
  • Monitor REST API traffic for unexpected changes to PayPal or banking fields and investigate any anomalies promptly.

Generated by OpenCVE AI on April 21, 2026 at 16:15 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Dokan
Dokan dokan
Wordpress
Wordpress wordpress
Vendors & Products Dokan
Dokan dokan
Wordpress
Wordpress wordpress

Tue, 20 Jan 2026 04:45:00 +0000

Type Values Removed Values Added
Description The Dokan: AI Powered WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 4.2.4 via the `/wp-json/dokan/v1/settings` REST API endpoint due to missing validation on a user-controlled key. This makes it possible for authenticated attackers, with customer-level permissions and above, to read or modify other vendors' store settings including sensitive payment information (PayPal email, bank account details, routing numbers, IBAN, SWIFT codes), phone numbers, and addresses, and change PayPal email addresses to attacker-controlled addresses, enabling financial theft when the marketplace processes payouts.
Title Dokan: AI Powered WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy <= 4.2.4 - Insecure Direct Object Reference to PayPal Account Takeover and Sensitive Information Disclosure
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:50:47.498Z

Reserved: 2025-12-19T15:58:09.269Z

Link: CVE-2025-14977

cve-icon Vulnrichment

Updated: 2026-01-20T15:11:20.893Z

cve-icon NVD

Status : Deferred

Published: 2026-01-20T05:16:08.293

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-14977

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T16:30:40Z

Weaknesses