CVE-2025-4105
Splitit <= 4.2.8 - Missing Authorization to Multiple Administrative Actions
CVSS Score
5.4
EPSS Score
0.0%
EPSS Percentile
0th
The Splitit plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on several functions in the 'splitIt-flexfields-payment-gateway.php' file in all versions up to, and including, 4.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change plugin settings, including changing the environment from sandbox to production and vice versa.
| CWE | CWE-862 |
| Vendor | splitit |
| Product | splitit |
| Published | May 21, 2025 |
| Last Updated | Apr 8, 2026 |
Stay Ahead of the Next One
Get instant alerts for splitit splitit
Be the first to know when new medium vulnerabilities affecting splitit splitit are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
splitit / Splitit
0 โค 4.2.8
References
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/6471b075-8115-4d38-a7dd-2308dca69f15?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/splitit-installment-payments/tags/4.2.6/splitIt-flexfields-payment-gateway.php#L765 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/splitit-installment-payments/tags/4.2.6/splitIt-flexfields-payment-gateway.php#L1927 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3297893%40splitit-installment-payments&new=3297893%40splitit-installment-payments&sfp_email=&sfph_mail=
Credits
Sushi Com Abacate