WooODT Lite – Delivery & pickup date time location for WooCommerce …

WooODT Lite – Delivery & pickup date time location for WooCommerce …

by | Feb 17, 2026 | Plugins

Attack Vectors

CVE-2025-69401 is a Medium-severity (CVSS 5.3) vulnerability affecting the WordPress plugin WooODT Lite – Delivery & pickup date time location for WooCommerce (slug: byconsole-woo-order-delivery-time) in versions up to and including 2.5.2. The issue is described as an unauthenticated payment bypass, meaning an attacker does not need to log in to attempt to place orders without completing payment.

From a business perspective, this is most relevant for organizations running WooCommerce storefronts where WooODT Lite is installed and checkout workflows are exposed to the internet. Any environment that allows public ordering is potentially in scope because the attacker does not require valid user credentials.

Security Weakness

The reported weakness is a payment bypass condition in WooODT Lite <= 2.5.2 that can allow orders to be created without successful payment. Because this is unauthenticated, it suggests the checkout or order-finalization path can be manipulated from outside the site, without a customer account.

The practical risk is amplified by the remediation status: there is no known patch available at this time. That changes the risk decision from “update quickly” to “mitigate, replace, or remove,” based on your organization’s risk tolerance, revenue exposure, and operational constraints.

Technical or Business Impacts

Revenue leakage and fraud: Attackers may be able to place orders without paying, causing direct financial loss, increased chargeback or dispute overhead, and distorted sales reporting.

Operational disruption: Unpaid orders can trigger downstream costs—warehouse picking/packing, shipping label creation, customer service time, and inventory allocation—especially if fulfillment processes rely on order status signals that can be manipulated.

Brand and customer trust risk: If unpaid orders slip into fulfillment or customer communications, it can create confusion, negative customer experiences, and reputational harm that marketing teams must manage.

Compliance and governance implications: For finance and compliance stakeholders, payment-bypass scenarios can undermine internal controls over revenue recognition, audit trails, and fraud monitoring. This is particularly important if reporting depends on WooCommerce order events rather than confirmed payment records.

Recommended action (given no known patch): Review exposure immediately. Consider uninstalling WooODT Lite and replacing it with an alternative, or implementing compensating controls such as tighter validation of paid status before fulfillment, monitoring for unusual order patterns, and restricting checkout pathways based on risk tolerance.

Similar Attacks

Payment and checkout abuse is a well-established fraud pattern across e-commerce platforms. While the exact mechanism varies by product, the business impact is consistently tied to revenue loss and operational disruption. Here are real, widely reported examples of checkout/payment abuse patterns:

Magecart payment skimming campaigns impacting e-commerce checkouts (BleepingComputer)
CISA alert on Magecart-style e-commerce attacks (CISA)
Overview of card-skimming risks in online checkout flows (Imperva)

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers