The OneClick Chat to Order plugin for WordPress is vulnerable to authorization bypass in versions up to, and including, 1.0.9. This is due to the plugin not properly verifying that a user is authorized to perform an action in the wa_order_number_save_number_field function. This makes it possible for authenticated attackers, with Editor-level access and above, to modify WhatsApp phone numbers used by the plugin, redirecting customer orders and messages to attacker-controlled phone numbers.
References
Configurations
No configuration.
History
19 Feb 2026, 07:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-19 07:17
Updated : 2026-02-19 15:53
NVD link : CVE-2025-14270
Mitre link : CVE-2025-14270
CVE.ORG link : CVE-2025-14270
JSON object : View
Products Affected
No product.
CWE
CWE-862
Missing Authorization
