Atomic Edge analysis of CVE-2025-14948:
This vulnerability is a missing authorization flaw in the miniOrange OTP Verification and SMS Notification for WooCommerce WordPress plugin. It allows unauthenticated attackers to modify the plugin’s SMS notification settings for WooCommerce orders. The CVSS score of 5.3 indicates a medium severity impact.
The root cause is the plugin’s AJAX handler function `enable_wc_sms_notification` lacking proper capability and nonce checks. In the vulnerable version, the file `notifications/wcsmsnotification/handler/class-woocommercenotifications.php` registered the action `enable_wc_sms_notification` for both authenticated (`wp_ajax_`) and unauthenticated (`wp_ajax_nopriv_`) users on line 71. The function itself, defined starting at line 142, only performed a nonce check. It did not verify if the requesting user had administrative privileges, such as the `manage_options` capability.
Exploitation involves sending a POST request to the WordPress `admin-ajax.php` endpoint. The attacker sets the `action` parameter to `mo_wc_notification_enable`. The request must also include a `notification` POST parameter containing the specific notification type to enable or disable. The attack succeeds because the endpoint is accessible to unauthenticated users and the handler lacks an authorization check.
The patch in version 4.3.9 addresses the issue with two key changes. First, line 71 removes the `wp_ajax_nopriv_` hook registration, restricting the endpoint to authenticated users only. Second, the `enable_wc_sms_notification` function is updated. Lines 143-152 add a check for the `current_user_can(‘manage_options’)` capability, ensuring only administrators can proceed. The patch also strengthens the nonce verification by adding a nonce key and value to the localized script on lines 130-131 and using `check_ajax_referer` on line 154.
Successful exploitation allows an unauthenticated attacker to toggle the plugin’s SMS notification settings on or off. This could disrupt store operations by disabling order confirmations or administrative alerts sent via SMS. While the vulnerability does not directly lead to data exposure or code execution, it enables unauthorized modification of a critical business function, impacting the integrity of the WooCommerce store’s notification system.







