Home

Description

The PAYGENT for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 2.4.6. This is due to missing authorization checks on the paygent_check_webhook function combined with the paygent_permission_callback function unconditionally returning true on line 199. This makes it possible for unauthenticated attackers to manipulate payment callbacks and modify order statuses by sending forged payment notifications via the `/wp-json/paygent/v1/check/` endpoint.

PUBLISHED Reserved 2025-12-04 | Published 2026-01-17 | Updated 2026-01-17 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-18:Vendor Notified
2026-01-16:Disclosed

Credits

Benachi finder

Terumi Benamou finder

References

www.wordfence.com/...-a1d2-48f2-a594-4013a9490e25?source=cve

plugins.trac.wordpress.org/.../class-wc-paygent-endpoint.php

plugins.trac.wordpress.org/.../class-wc-paygent-endpoint.php

plugins.trac.wordpress.org/...ent-main&sfp_email=&sfph_mail=

plugins.trac.wordpress.org/...ent-main&sfp_email=&sfph_mail=

cve.org (CVE-2025-14078)

nvd.nist.gov (CVE-2025-14078)

Download JSON