5.3
CVE-2025-14757
- EPSS 0.03%
- Veröffentlicht 16.01.2026 08:38:29
- Zuletzt bearbeitet 23.01.2026 17:12:40
- Quelle security@wordfence.com
- CVE-Watchlists
- Unerledigt
Cost Calculator Builder <= 3.6.9 - Missing Authorization to Unauthenticated Payment Status Bypass
The Cost Calculator Builder plugin for WordPress is vulnerable to Unauthenticated Payment Status Bypass in all versions up to, and including, 3.6.9 only when used in combination with Cost Calculator Builder PRO. This is due to the complete_payment AJAX action being registered via wp_ajax_nopriv, making it accessible to unauthenticated users, and the complete() function only verifying a nonce without checking user capabilities or order ownership. Since nonces are exposed to all visitors via window.ccb_nonces in the page source, any unauthenticated attacker can mark any order's payment status as "completed" without actual payment.
Mögliche Gegenmaßnahme
Cost Calculator Builder: Update to version 3.6.10, or a newer patched version
Weitere Schwachstelleninformationen
SystemWordPress Plugin
≫
Produkt
Cost Calculator Builder
Version
*-3.6.9
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Stylemixthemes ≫ Cost Calculator Builder SwEditionfree SwPlatformwordpress Version < 3.6.10
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.03% | 0.091 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| security@wordfence.com | 5.3 | 3.9 | 1.4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
|
CWE-862 Missing Authorization
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.