The Splitit plugin for WordPress is vulnerable to unauthorized modification of data due to missing capability checks on several functions in the 'splitIt-flexfields-payment-gateway.php' file in all versions up to, and including, 4.2.8. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change plugin settings, including changing the environment from sandbox to production and vice versa.
CVE ID: CVE-2025-4105
CVSS Base Severity: MEDIUM
CVSS Base Score: 5.4
CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Vendor: splitit
Product: Splitit
EPSS Score: 0.03% (probability of being exploited)
EPSS Percentile: 6.06% (scored less or equal to compared to others)
EPSS Date: 2025-06-19 (when was this score calculated)