The PeachPay — Payments & Express Checkout for WooCommerce (supports Stripe, PayPal, Square, Authorize.net) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability checks on the ConvesioPay webhook REST endpoint in all versions up to, and including, 1.119.8. This makes it possible for unauthenticated attackers to modify the status of arbitrary WooCommerce orders.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 21 Jan 2026 06:15:00 +0900

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 20 Jan 2026 17:45:00 +0900

Type Values Removed Values Added
First Time appeared Peachpay
Peachpay peachpay - Payments & Express Checkout For Woocommerce (supports Stripe, Paypal, Square, Authorizenet)
Wordpress
Wordpress wordpress
Vendors & Products Peachpay
Peachpay peachpay - Payments & Express Checkout For Woocommerce (supports Stripe, Paypal, Square, Authorizenet)
Wordpress
Wordpress wordpress

Tue, 20 Jan 2026 11:00:00 +0900

Type Values Removed Values Added
Description The PeachPay — Payments & Express Checkout for WooCommerce (supports Stripe, PayPal, Square, Authorize.net) plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability checks on the ConvesioPay webhook REST endpoint in all versions up to, and including, 1.119.8. This makes it possible for unauthenticated attackers to modify the status of arbitrary WooCommerce orders.
Title PeachPay — Payments & Express Checkout for WooCommerce (supports Stripe, PayPal, Square, Authorize.net) <= 1.119.8 - Missing Authorization to Unauthenticated Order Status Modification
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-01-20T20:54:26.888Z

Reserved: 2025-12-19T16:06:55.163Z

Link: CVE-2025-14978

cve-icon Vulnrichment

Updated: 2026-01-20T20:54:10.416Z

cve-icon NVD

Status : Received

Published: 2026-01-20T02:15:45.873

Modified: 2026-01-20T02:15:45.873

Link: CVE-2025-14978

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-01-20T17:40:10Z

Weaknesses