Description
Missing Authorization vulnerability in Breeze Team Breeze Checkout breeze-checkout allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Breeze Checkout: from n/a through <= 1.4.0.
Published: 2025-10-22
Score: 6.5 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The Breeze Checkout plugin for WordPress suffers from a missing authorization flaw that allows attackers to bypass configured access control security levels. Because the plugin does not enforce proper authorization checks, malicious users can perform actions beyond their granted roles, such as accessing protected options or executing privileged operations. The weakness is classified as CWE‑862, making unauthorized access to resources controlled by the plugin possible.

Affected Systems

All installations of Breeze Checkout versions up to and including 1.4.0 are affected. The vulnerability applies to Breeze Team's Breeze Checkout plugin for WordPress; no information indicates a patch release of the plugin at this time.

Risk and Exploitability

The CVSS score of 6.5 reflects moderate severity, while the EPSS score of less than 1% indicates a low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Exploitation would likely involve web requests to the plugin’s endpoints and does not require special privileges beyond the ability to interact with the affected WordPress site, potentially making it available to any authenticated or unauthenticated user depending on plugin configuration.

Generated by OpenCVE AI on April 30, 2026 at 14:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Download and install the most recent Breeze Checkout release once the vendor provides a patch, or otherwise confirm that the version in use is not affected.
  • Restrict the plugin’s administrative interfaces to users with the Administrator role or other appropriate capabilities by adding role checks or by disabling features that do not enforce proper access control.
  • Deactivate or uninstall the Breeze Checkout plugin on sites where its functionality is not required.
  • Continuously monitor the plugin’s release notes and security advisories for an official fix, and keep WordPress core and all other plugins up to date to minimize the overall attack surface.

Generated by OpenCVE AI on April 30, 2026 at 14:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L'}


Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 23 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}


Thu, 23 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
Description Missing Authorization vulnerability in Breeze Team Breeze Checkout breeze-checkout allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Breeze Checkout: from n/a through <= 1.4.0.
Title WordPress Breeze Checkout plugin <= 1.4.0 - Broken Access Control vulnerability
Weaknesses CWE-862
References

Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:13:14.119Z

Reserved: 2025-06-11T16:07:34.181Z

Link: CVE-2025-49961

cve-icon Vulnrichment

Updated: 2025-10-23T14:18:48.077Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T15:15:42.873

Modified: 2026-04-27T20:16:19.330

Link: CVE-2025-49961

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T15:00:14Z

Weaknesses