CVE-2025-49950

HIGH
2025-10-22 [email protected]
7.3
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
Low
Integrity
Low
Availability
Low

Lifecycle Timeline

2
Analysis Generated
Apr 01, 2026 - 15:22 vuln.today
CVE Published
Oct 22, 2025 - 15:15 nvd
HIGH 7.3

Description

Missing Authorization vulnerability in billingo Official Integration for Billingo billingo allows Privilege Escalation.This issue affects Official Integration for Billingo: from n/a through <= 4.3.0.

Analysis

Privilege escalation in Official Integration for Billingo WordPress plugin (versions ≤4.3.0) enables unauthenticated remote attackers to bypass authorization controls and gain elevated access. The vulnerability stems from missing authorization checks (CWE-862), allowing attackers over the network with low complexity and no user interaction. No active exploitation confirmed (EPSS 0.06%, 18th percentile), but the unauthenticated remote attack vector with straightforward exploitation makes this a notable risk for WordPress sites using this billing integration plugin.

Technical Context

This vulnerability affects the Official Integration for Billingo WordPress plugin, which provides integration with the Billingo online invoicing service for Hungarian businesses. The root cause is CWE-862 (Missing Authorization), indicating the plugin fails to implement proper authorization checks on one or more sensitive functions or endpoints. In WordPress plugin architecture, this typically manifests as AJAX handlers, REST API endpoints, or admin actions that lack capability checks (current_user_can()) or nonce verification, allowing any unauthenticated user to invoke privileged operations. The CVSS vector (PR:N) confirms no authentication is required, meaning the vulnerable endpoint is accessible to anonymous users. This represents a fundamental access control failure where the application does not verify whether a user has permission to perform requested actions.

Affected Products

The vulnerability affects the Official Integration for Billingo WordPress plugin in all versions up to and including version 4.3.0. This plugin provides WordPress integration with Billingo, a Hungarian online invoicing and billing platform. The affected product is specifically identified as a WordPress plugin (wordpress-official-integration-for-billingo-plugin per the Patchstack reference), deployed on WordPress installations requiring Billingo payment processing functionality. The vendor advisory and technical details are available through Patchstack at https://patchstack.com/database/Wordpress/Plugin/billingo/vulnerability/wordpress-official-integration-for-billingo-plugin-4-2-5-privilege-escalation-vulnerability.

Remediation

WordPress site administrators should immediately upgrade the Official Integration for Billingo plugin to a version newer than 4.3.0 that addresses this authorization vulnerability. Check the official WordPress plugin repository or Billingo vendor channels for the latest patched release. As an immediate mitigation if patching is delayed, consider temporarily disabling the plugin if Billingo integration is not actively required for business operations, or implement web application firewall (WAF) rules to restrict access to the plugin's endpoints to authenticated administrative users only. Review WordPress user accounts and audit logs for any suspicious privilege changes or unauthorized access that may have occurred prior to patching. Consult the Patchstack advisory at https://patchstack.com/database/Wordpress/Plugin/billingo/vulnerability/wordpress-official-integration-for-billingo-plugin-4-2-5-privilege-escalation-vulnerability for technical indicators and detection guidance. Organizations should verify their installed version through the WordPress admin panel (Plugins section) and prioritize this update in their patch management cycle.

Priority Score

37
Low Medium High Critical
KEV: 0
EPSS: +0.1
CVSS: +36
POC: 0

Share

CVE-2025-49950 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy