[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fVbrJy9WITaKUbKCXe0AzhwfMfd1Yhfc1hMOjfcozchc":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2025-6025","order-tip-for-woocommerce-unauthenticated-tip-manipulation-to-negative-value-leading-to-unauthorized-discounts","Order Tip for WooCommerce \u003C= 1.5.4 - Unauthenticated Tip Manipulation to Negative Value Leading to Unauthorized Discounts","The Order Tip for WooCommerce plugin for WordPress is vulnerable to Unauthenticated Improper Input Validation in all versions up to, and including, 1.5.4. This is due to lack of server-side validation on the `data-tip` attribute, which makes it possible for unauthenticated attackers to apply an excessive or even negative tip amount, resulting in unauthorized discount up to free orders depending on the value submitted.","order-tip-woo",null,"\u003C=1.5.4","1.5.5","high",7.5,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:H\u002FA:N","Client-Side Enforcement of Server-Side Security","2025-08-14 13:51:21","2025-08-15 02:24:23",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F9bcd18bd-032e-4a97-83aa-a377f9b1f435?source=api-prod",1]