Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 21 Jan 2026 01:15:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 20 Jan 2026 17:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dokan
Dokan dokan Wordpress Wordpress wordpress |
|
| Vendors & Products |
Dokan
Dokan dokan Wordpress Wordpress wordpress |
Tue, 20 Jan 2026 13:45:00 +0900
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Dokan: AI Powered WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy plugin for WordPress is vulnerable to Insecure Direct Object Reference in versions up to, and including, 4.2.4 via the `/wp-json/dokan/v1/settings` REST API endpoint due to missing validation on a user-controlled key. This makes it possible for authenticated attackers, with customer-level permissions and above, to read or modify other vendors' store settings including sensitive payment information (PayPal email, bank account details, routing numbers, IBAN, SWIFT codes), phone numbers, and addresses, and change PayPal email addresses to attacker-controlled addresses, enabling financial theft when the marketplace processes payouts. | |
| Title | Dokan: AI Powered WooCommerce Multivendor Marketplace Solution – Build Your Own Amazon, eBay, Etsy <= 4.2.4 - Insecure Direct Object Reference to PayPal Account Takeover and Sensitive Information Disclosure | |
| Weaknesses | CWE-284 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-01-20T15:11:26.613Z
Reserved: 2025-12-19T15:58:09.269Z
Link: CVE-2025-14977
Updated: 2026-01-20T15:11:20.893Z
Status : Received
Published: 2026-01-20T05:16:08.293
Modified: 2026-01-20T05:16:08.293
Link: CVE-2025-14977
No data.
OpenCVE Enrichment
Updated: 2026-01-20T17:39:53Z