The Splitit plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on several functions in the 'splitIt-flexfields-payment-gateway.php' file in all versions up to, and including, 4.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change plugin settings, including changing the environment from sandbox to production and vice versa.
Metrics
Affected Vendors & Products
References
History
Wed, 21 May 2025 11:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 21 May 2025 09:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | The Splitit plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on several functions in the 'splitIt-flexfields-payment-gateway.php' file in all versions up to, and including, 4.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change plugin settings, including changing the environment from sandbox to production and vice versa. | |
Title | Splitit <= 4.2.8 - Missing Authorization to Multiple Administrative Actions | |
Weaknesses | CWE-862 | |
References |
|
|
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: Wordfence
Published: 2025-05-21T09:21:50.660Z
Updated: 2025-05-21T10:16:39.665Z
Reserved: 2025-04-29T23:43:47.744Z
Link: CVE-2025-4105

Updated: 2025-05-21T10:11:45.582Z

Status : Awaiting Analysis
Published: 2025-05-21T12:16:22.473
Modified: 2025-05-21T20:24:58.133
Link: CVE-2025-4105

No data.