INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global phishing Multiple sectors HIGH 25m Global insider Cybersecurity Services CRITICAL 35m Global ransomware Multiple sectors (U.S. companies) CRITICAL 48m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 25m Global insider Cybersecurity Services CRITICAL 35m Global ransomware Multiple sectors (U.S. companies) CRITICAL 48m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h Global phishing Multiple sectors HIGH 25m Global insider Cybersecurity Services CRITICAL 35m Global ransomware Multiple sectors (U.S. companies) CRITICAL 48m Global malware Financial Services, Cryptocurrency CRITICAL 1h Global malware Technology and Cloud Services HIGH 1h Global general Financial Services and E-commerce MEDIUM 1h Global data_breach Social Media and Communications CRITICAL 1h Global general Cybersecurity Operations HIGH 2h Global phishing Technology and Consumer Services HIGH 2h Global data_breach Multiple sectors HIGH 2h
Vulnerabilities

CVE-2025-14070

High
Reviewify WordPress Plugin Unauthorized Coupon Creation Vulnerability (CVE-2025-14070)
CWE-862 — Weakness Type
Published: Jan 7, 2026  ·  Modified: Feb 28, 2026  ·  Source: NVD
CVSS v3
7.5
🔗 NVD Official
📄 Description (English)

The Reviewify plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'send_test_email' AJAX action in all versions up to, and including, 1.0.6. This makes it possible for authenticated attackers, with Contributor-level access and above, to create arbitrary WooCommerce discount coupons, potentially causing financial loss to the store.

🤖 AI Executive Summary

The Reviewify WordPress plugin versions up to 1.0.6 contains a critical authorization bypass vulnerability (CWE-862) that allows authenticated attackers with Contributor-level access to create arbitrary WooCommerce discount coupons through the 'send_test_email' AJAX action. This vulnerability enables low-privileged users to generate unlimited discount codes, potentially causing significant financial losses to e-commerce operations.

📄 Description (Arabic)

تنشأ الثغرة من غياب فحص الصلاحيات المناسب على وظيفة AJAX المسماة 'send_test_email' في إضافة Reviewify، مما يسمح لأي مستخدم مصادق عليه بمستوى مساهم أو أعلى بإنشاء قسائم خصم WooCommerce دون تفويض مناسب. يمكن استغلال هذه الثغرة لإنشاء قسائم خصم بقيم عشوائية وشروط مخصصة، مما يؤدي إلى خسائر مالية مباشرة للمتاجر الإلكترونية. تصنف الثغرة ضمن CWE-862 (Missing Authorization) وتحمل درجة خطورة عالية بمعدل CVSS 7.5، مما يستدعي اتخاذ إجراءات فورية لحماية منصات التجارة الإلكترونية المعتمدة على WooCommerce وWordPress.

🤖 ملخص تنفيذي (AI)

تحتوي إضافة Reviewify لووردبريس حتى الإصدار 1.0.6 على ثغرة خطيرة في تجاوز التفويض (CWE-862) تسمح للمهاجمين المصادق عليهم بصلاحيات المساهم بإنشاء قسائم خصم WooCommerce عشوائية من خلال إجراء AJAX المسمى 'send_test_email'. تمكن هذه الثغرة المستخدمين ذوي الصلاحيات المنخفضة من إنشاء أكواد خصم غير محدودة، مما قد يتسبب في خسائر مالية كبيرة لعمليات التجارة الإلكترونية.

🤖 AI Intelligence Analysis Analyzed: Feb 28, 2026 07:42
🇸🇦 Saudi Arabia Impact Assessment
Saudi e-commerce platforms using WordPress and WooCommerce with the Reviewify plugin face direct financial risk from unauthorized coupon generation. This vulnerability particularly threatens retail, hospitality, and online marketplace sectors operating under SAMA's payment system oversight, potentially leading to revenue loss, fraudulent transactions, and non-compliance with financial controls required by SAMA CSF.
🏢 Affected Saudi Sectors
التجارة الإلكترونية التجزئة الضيافة والسياحة الخدمات المالية الأسواق الإلكترونية
🎯 MITRE ATT&CK Techniques
⚖️ Saudi Risk Score (AI)
8.0
/ 10.0
🔧 Remediation Steps (English)
1. Immediately disable or remove the Reviewify plugin (versions ≤1.0.6) from all WordPress installations until a patched version is released by the vendor.
2. Conduct a comprehensive audit of all WooCommerce discount coupons created in the past 90 days, identifying and deactivating any unauthorized or suspicious coupons, and review associated transactions for fraudulent activity.
3. Implement WordPress role-based access control restrictions, limiting Contributor-level accounts to read-only permissions, and deploy Web Application Firewall (WAF) rules to monitor and block suspicious AJAX requests to WordPress admin endpoints.
🔧 خطوات المعالجة (العربية)
1. تعطيل أو إزالة إضافة Reviewify (الإصدارات ≤1.0.6) فوراً من جميع تثبيتات ووردبريس حتى يتم إصدار نسخة محدثة من المورّد.
2. إجراء مراجعة شاملة لجميع قسائم الخصم في WooCommerce التي تم إنشاؤها خلال الـ 90 يوماً الماضية، وتحديد وإلغاء تفعيل أي قسائم غير مصرح بها أو مشبوهة، ومراجعة المعاملات المرتبطة بها للكشف عن أي نشاط احتيالي.
3. تطبيق قيود التحكم في الوصول المبني على الأدوار في ووردبريس، وتقييد حسابات مستوى المساهم بصلاحيات القراءة فقط، ونشر قواعد جدار حماية تطبيقات الويب (WAF) لمراقبة وحظر طلبات AJAX المشبوهة إلى نقاط نهاية إدارة ووردبريس.
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-1-2 (Access Control) ECC-3-1 (Vulnerability Management) ECC-4-2 (Application Security) ECC-5-3 (Security Monitoring)
🔵 SAMA CSF
CCC-1.1.1 (Access Control Policy) CCC-2.1.3 (Secure Development) CCC-3.1.2 (Vulnerability Assessment) CCC-4.2.1 (Financial Transaction Security)
🟡 ISO 27001:2022
A.9.2.1 (User Registration) A.9.4.1 (Information Access Restriction) A.12.6.1 (Technical Vulnerability Management) A.14.2.5 (Secure System Engineering)
📊 CVSS Score
7.5
/ 10.0 — High
📊 CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Attack VectorN — None / Network
Attack ComplexityL — Low / Local
Privileges RequiredN — None / Network
User InteractionN — None / Network
ScopeU — Unchanged
ConfidentialityN — None / Network
IntegrityH — High
AvailabilityN — None / Network
📋 Quick Facts
Severity High
CVSS Score7.5
CWECWE-862
EPSS0.01%
Exploit No
Patch ✓ Yes
Published 2026-01-07
Source Feed nvd
Views 1
🇸🇦 Saudi Risk Score
8.0
/ 10.0 — Saudi Risk
Priority: HIGH
🏷️ Tags
CWE-862
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.