CVE-2025-15482
Unknown Unknown - Not Provided
Sensitive Information Exposure in Chapa WooCommerce Plugin API

Publication date: 2026-02-04

Last updated on: 2026-02-04

Assigner: Wordfence

Description
The Chapa Payment Gateway Plugin for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.3 via 'chapa_proceed' WooCommerce API endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including the merchant's Chapa secret API key.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-02-04
Last Modified
2026-02-04
Generated
2026-05-06
AI Q&A
2026-02-04
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
chapa payment_gateway to 1.0.3 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-200 The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

[{'type': 'paragraph', 'content': "The Chapa Payment Gateway Plugin for WooCommerce (up to version 1.0.3) has a vulnerability in its 'chapa_proceed' WooCommerce API endpoint that allows unauthenticated attackers to extract sensitive information."}, {'type': 'paragraph', 'content': "Specifically, this vulnerability exposes the merchant's Chapa secret API key by including it in a hidden form field during the payment redirect process, which can be accessed without authentication."}] [2]


How can this vulnerability impact me? :

[{'type': 'paragraph', 'content': "This vulnerability can lead to sensitive information exposure, specifically the leakage of the merchant's secret API key."}, {'type': 'paragraph', 'content': "An attacker who obtains this secret key could potentially misuse it to perform unauthorized actions on the merchant's Chapa payment account, such as initiating fraudulent transactions or accessing confidential payment data."}, {'type': 'paragraph', 'content': 'Since the vulnerability is exploitable without authentication, it increases the risk of compromise and financial loss for merchants using the affected plugin versions.'}] [2]


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

[{'type': 'paragraph', 'content': "This vulnerability can be detected by monitoring network traffic for unauthorized access or exposure of the Chapa secret API key via the 'chapa_proceed' WooCommerce API endpoint."}, {'type': 'paragraph', 'content': "You can use network inspection tools like curl or wget to test the endpoint for sensitive data exposure by sending requests to the 'chapa_proceed' endpoint and analyzing the response for the presence of the secret API key."}, {'type': 'list_item', 'content': 'Use curl to send a GET request to the chapa_proceed endpoint with required parameters and check if the secret key is exposed in the response.'}, {'type': 'list_item', 'content': "Example command: curl -G 'https://yourwordpresssite.com/wp-json/wc/v3/chapa_proceed' --data-urlencode 'tx_ref=sample' --data-urlencode 'amount=1' --data-urlencode '[email protected]' --data-urlencode 'first_name=Test' --data-urlencode 'last_name=User' --data-urlencode 'title=Test' --data-urlencode 'currency=USD'"}, {'type': 'paragraph', 'content': 'Inspect the response for any inclusion of the secret API key or other sensitive information.'}] [2]


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include updating the Chapa Payment Gateway Plugin for WooCommerce to a version later than 1.0.3 where this vulnerability is fixed.

If an update is not immediately available, consider disabling the Chapa payment gateway plugin to prevent exposure of the secret API key.

Additionally, rotate or revoke the exposed Chapa secret API key to prevent unauthorized use.

Monitor your WooCommerce and WordPress logs for suspicious activity related to the 'chapa_proceed' endpoint.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart