CVE-2025-15484
Unauthorized Access in WooCommerce Order Notification Plugin Before
Publication date: 2026-04-01
Last updated on: 2026-04-01
Assigner: WPScan
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-287 | When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
CVE-2025-15484 is a high-severity authentication bypass vulnerability in the WordPress plugin "Order Notification for WooCommerce" versions prior to 3.6.3.
The vulnerability occurs because the plugin overrides WooCommerce's standard permission checks, allowing unauthenticated REST API requests to gain full read and write access to critical store resources such as products, coupons, and customers.
- An attacker can list products without authentication using GET requests.
- They can create new products via unauthenticated POST requests.
- They can update existing products using unauthenticated PUT requests.
- They can delete products through unauthenticated DELETE requests.
- They can create coupons without authentication by POSTing coupon details.
This means an attacker can fully control the store's inventory and promotional mechanisms without any authentication.
How can this vulnerability impact me? :
This vulnerability can have severe impacts on your WooCommerce store.
- Attackers can gain full read and write access to your store's products, coupons, and customer data without authentication.
- They can manipulate your product listings by creating, updating, or deleting products.
- They can create unauthorized coupons, potentially causing financial loss.
- Customer data could be exposed or altered, leading to privacy breaches.
Overall, this can lead to loss of revenue, damage to your store's reputation, and compromise of sensitive customer information.
How can this vulnerability be detected on my network or system? Can you suggest some commands?
This vulnerability can be detected by attempting unauthenticated REST API requests to the WooCommerce endpoints exposed by the vulnerable plugin. Specifically, you can test if you can list, create, update, or delete products or create coupons without authentication.
- Send a GET request to `/wp-json/wc/v3/products` to check if product listing is accessible without authentication.
- Send a POST request with JSON product data to `/wp-json/wc/v3/products` to test if new products can be created without authentication.
- Send a PUT request with modified product data to `/wp-json/wc/v3/products/{product_id}` to check if products can be updated without authentication.
- Send a DELETE request to `/wp-json/wc/v3/products/{product_id}` to test if products can be deleted without authentication.
- Send a POST request with coupon details in JSON format to `/wp-json/wc/v3/coupons` to check if coupons can be created without authentication.
What immediate steps should I take to mitigate this vulnerability?
The immediate step to mitigate this vulnerability is to update the 'Order Notification for WooCommerce' plugin to version 3.6.3 or later, where the issue has been fixed.
Until the update can be applied, consider restricting access to the WooCommerce REST API endpoints by implementing authentication or IP-based access controls to prevent unauthenticated requests.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
This vulnerability allows unauthenticated attackers to gain full read and write access to sensitive store resources such as products, coupons, and customer data. Such unauthorized access to customer information and store data can lead to violations of data protection regulations like GDPR and HIPAA, which require strict controls over personal and sensitive data to prevent unauthorized access and ensure data confidentiality and integrity.
By bypassing authentication and permission checks, the vulnerability undermines the security controls necessary for compliance with these standards, potentially exposing personal data to unauthorized parties and increasing the risk of data breaches.