CVE-2025-68013

6.5 MEDIUM

📋 TL;DR

This CVE describes a Missing Authorization vulnerability in the Payment Gateway Authorize.Net CIM for WooCommerce plugin that allows unauthorized users to delete arbitrary content. It affects WordPress sites using this plugin for payment processing. The vulnerability exists due to insufficient access controls on certain functions.

💻 Affected Systems

Products:
  • Payment Gateway Authorize.Net CIM for WooCommerce
Versions: All versions up to and including 2.1.2
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects WordPress installations with the vulnerable plugin enabled. Requires WooCommerce to be installed.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could delete critical website content, payment configurations, or user data, potentially disrupting e-commerce operations and causing data loss.

🟠

Likely Case

Unauthorized content deletion leading to website defacement, loss of product listings, or disruption of payment processing functionality.

🟢

If Mitigated

With proper access controls and authentication checks, the vulnerability would be prevented, maintaining normal plugin functionality.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires some level of access but doesn't require admin privileges. The vulnerability is in access control logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 2.1.2

Vendor Advisory: https://patchstack.com/database/Wordpress/Plugin/authnet-cim-for-woo/vulnerability/wordpress-payment-gateway-authorize-net-cim-for-woocommerce-plugin-2-1-2-arbitrary-content-deletion-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find 'Payment Gateway Authorize.Net CIM for WooCommerce'. 4. Click 'Update Now' if available, or download latest version from WordPress repository. 5. Activate updated plugin.

🔧 Temporary Workarounds

Disable vulnerable plugin

all

Temporarily disable the plugin until patched, but this will break payment processing

wp plugin deactivate authnet-cim-for-woo

Restrict plugin access

all

Implement additional access controls via WordPress roles or security plugins

🧯 If You Can't Patch

  • Implement web application firewall rules to block unauthorized content deletion requests
  • Enable detailed logging and monitoring for unauthorized content modification attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins for 'Payment Gateway Authorize.Net CIM for WooCommerce' version

Check Version:

wp plugin get authnet-cim-for-woo --field=version

Verify Fix Applied:

Verify plugin version is greater than 2.1.2 in WordPress admin panel

📡 Detection & Monitoring

Log Indicators:

  • Unauthorized POST requests to plugin endpoints
  • Unexpected content deletion events in WordPress logs
  • Failed authorization attempts on payment gateway functions

Network Indicators:

  • HTTP requests to /wp-content/plugins/authnet-cim-for-woo/ with deletion parameters from unauthorized IPs

SIEM Query:

source="wordpress" AND (plugin="authnet-cim-for-woo" OR uri_path="/authnet-cim-for-woo/") AND (http_method="POST" OR action="delete")

🔗 References

📤 Share & Export