OneClick Chat to Order Vulnerability (Low) – CVE-2025-14270

OneClick Chat to Order Vulnerability (Low) – CVE-2025-14270

by | Feb 18, 2026 | Plugins

Attack Vectors

The vulnerability in OneClick Chat to Order (slug: oneclick-whatsapp-order) affects versions up to and including 1.0.9 and is rated Low severity (CVSS 2.7, CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N). It can be exploited by an authenticated user who already has Editor-level access (or higher) in WordPress.

An attacker in that role can target the plugin’s settings update path and change the WhatsApp phone number used by the plugin. This effectively redirects “chat to order” messages and customer inquiries to a phone number the attacker controls—without requiring any additional user interaction.

Security Weakness

CVE-2025-14270 is an authorization issue in the OneClick Chat to Order plugin, caused by the plugin not properly verifying whether the logged-in user is authorized to perform a sensitive settings update in the wa_order_number_save_number_field function.

In practical terms, this is a “missing authorization” gap: the plugin allows certain authenticated users to update a business-critical setting (the WhatsApp destination number) when stronger permission checks should be enforced.

Technical or Business Impacts

Revenue and lead loss: If your website relies on WhatsApp as a conversion channel, redirected messages can mean lost orders, missed inquiries, and reduced campaign ROI—especially for time-sensitive promotions.

Brand and customer trust risk: Customers may unknowingly share personal details or order information with the wrong recipient, creating reputational damage and customer support escalation.

Fraud and compliance exposure: Misrouted customer communications can introduce risks tied to record-keeping, consent, and handling of customer data. Even though the severity is rated Low, the business impact can be material because it affects a direct customer communications channel.

Operational disruption: Marketing and sales teams may see unexplained drops in WhatsApp-driven conversions, leading to wasted ad spend and time spent troubleshooting campaigns rather than executing them.

Remediation

Update OneClick Chat to Order to version 1.1.0 or a newer patched version. This is the vendor-recommended fix for CVE-2025-14270.

As an immediate risk-reduction step, review which users have Editor (or higher) access, and confirm that the configured WhatsApp phone number is correct across your site. If you use staging and production environments, verify both to ensure settings have not been altered.

Reference links: CVE-2025-14270 record and Wordfence advisory.

Similar Attacks

Authorization and access-control failures are a common cause of business-impacting incidents, especially when they affect administrative settings or customer communication paths. For context, here are a few widely documented examples:

OWASP Top 10: Broken Access Control
CISA alert: MOVEit Transfer vulnerability exploitation (2023)
CISA alert: Log4j (CVE-2021-44228) response guidance

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers