CVE-2025-15511
Unauthorized Data Modification in Rupantorpay Plugin via Missing Capability Check
Publication date: 2026-01-28
Last updated on: 2026-01-28
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| rupantorpay | rupantorpay | to 2.0.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Rupantorpay plugin for WordPress has a vulnerability due to a missing capability check in the handle_webhook() function. This allows unauthenticated attackers to send crafted requests to the WooCommerce API endpoint and modify WooCommerce order statuses without authorization.
How can this vulnerability impact me? :
This vulnerability can allow attackers to change the status of WooCommerce orders without permission, potentially leading to unauthorized order modifications, disruption of order processing, and possible financial or operational impacts on the affected e-commerce site.