CVE-2025-12634

4.3 MEDIUM

📋 TL;DR

This vulnerability in the Refund Request for WooCommerce WordPress plugin allows authenticated users with Subscriber-level access or higher to modify refund statuses without proper authorization. Attackers can change refund requests to approved or rejected states, potentially causing financial impact. All WordPress sites using this plugin up to version 1.0 are affected.

💻 Affected Systems

Products:
  • Refund Request for WooCommerce WordPress plugin
Versions: All versions up to and including 1.0
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress with WooCommerce installed. Vulnerability exists when plugin is active.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could approve fraudulent refund requests, leading to direct financial loss and potential regulatory compliance issues for e-commerce businesses.

🟠

Likely Case

Malicious users or compromised accounts could manipulate refund statuses, causing operational disruption, customer disputes, and minor financial impact.

🟢

If Mitigated

With proper access controls and monitoring, impact would be limited to unauthorized status changes that could be detected and reversed.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but only at Subscriber level, which is easily obtained through registration on many sites.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Version after 1.0 (check plugin repository for latest)

Vendor Advisory: https://wordpress.org/plugins/refund-request-for-woocommerce/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Refund Request for WooCommerce'. 4. Click 'Update Now' if available. 5. If no update available, deactivate and remove the plugin.

🔧 Temporary Workarounds

Temporary Access Restriction

all

Restrict user registration or elevate Subscriber capabilities temporarily

🧯 If You Can't Patch

  • Deactivate the Refund Request for WooCommerce plugin immediately
  • Implement additional monitoring for refund status changes in WooCommerce logs

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Refund Request for WooCommerce' version 1.0 or earlier

Check Version:

wp plugin list --name='refund-request-for-woocommerce' --field=version (WP-CLI)

Verify Fix Applied:

Verify plugin version is greater than 1.0 or plugin is deactivated/removed

📡 Detection & Monitoring

Log Indicators:

  • Unexpected refund status changes in WooCommerce logs
  • Multiple refund status updates from non-admin users

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with 'update_refund_status' action from non-admin users

SIEM Query:

source="wordpress.log" AND "update_refund_status" AND user_role!="administrator"

🔗 References

📤 Share & Export