The Splitit plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on several functions in the 'splitIt-flexfields-payment-gateway.php' file in all versions up to, and including, 4.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change plugin settings, including changing the environment from sandbox to production and vice versa.
History

Wed, 21 May 2025 11:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 21 May 2025 09:30:00 +0000

Type Values Removed Values Added
Description The Splitit plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on several functions in the 'splitIt-flexfields-payment-gateway.php' file in all versions up to, and including, 4.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change plugin settings, including changing the environment from sandbox to production and vice versa.
Title Splitit <= 4.2.8 - Missing Authorization to Multiple Administrative Actions
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-05-21T09:21:50.660Z

Updated: 2025-05-21T10:16:39.665Z

Reserved: 2025-04-29T23:43:47.744Z

Link: CVE-2025-4105

cve-icon Vulnrichment

Updated: 2025-05-21T10:11:45.582Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-05-21T12:16:22.473

Modified: 2025-05-21T20:24:58.133

Link: CVE-2025-4105

cve-icon Redhat

No data.