CVE-2025-15484
Received Received - Intake
Unauthorized Access in WooCommerce Order Notification Plugin Before

Publication date: 2026-04-01

Last updated on: 2026-04-01

Assigner: WPScan

Description
The Order Notification for WooCommerce WordPress plugin before 3.6.3 overrides WooCommerce's permission checks to grant full access to all unauthenticated requests, enabling complete read/write access to store resources like products, coupons, and customers.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-01
Last Modified
2026-04-01
Generated
2026-05-07
AI Q&A
2026-04-01
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Currently, no data is known.
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-287 When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-15484 is a high-severity authentication bypass vulnerability in the WordPress plugin "Order Notification for WooCommerce" versions prior to 3.6.3.

The vulnerability occurs because the plugin overrides WooCommerce's standard permission checks, allowing unauthenticated REST API requests to gain full read and write access to critical store resources such as products, coupons, and customers.

  • An attacker can list products without authentication using GET requests.
  • They can create new products via unauthenticated POST requests.
  • They can update existing products using unauthenticated PUT requests.
  • They can delete products through unauthenticated DELETE requests.
  • They can create coupons without authentication by POSTing coupon details.

This means an attacker can fully control the store's inventory and promotional mechanisms without any authentication.


How can this vulnerability impact me? :

This vulnerability can have severe impacts on your WooCommerce store.

  • Attackers can gain full read and write access to your store's products, coupons, and customer data without authentication.
  • They can manipulate your product listings by creating, updating, or deleting products.
  • They can create unauthorized coupons, potentially causing financial loss.
  • Customer data could be exposed or altered, leading to privacy breaches.

Overall, this can lead to loss of revenue, damage to your store's reputation, and compromise of sensitive customer information.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by attempting unauthenticated REST API requests to the WooCommerce endpoints exposed by the vulnerable plugin. Specifically, you can test if you can list, create, update, or delete products or create coupons without authentication.

  • Send a GET request to `/wp-json/wc/v3/products` to check if product listing is accessible without authentication.
  • Send a POST request with JSON product data to `/wp-json/wc/v3/products` to test if new products can be created without authentication.
  • Send a PUT request with modified product data to `/wp-json/wc/v3/products/{product_id}` to check if products can be updated without authentication.
  • Send a DELETE request to `/wp-json/wc/v3/products/{product_id}` to test if products can be deleted without authentication.
  • Send a POST request with coupon details in JSON format to `/wp-json/wc/v3/coupons` to check if coupons can be created without authentication.

What immediate steps should I take to mitigate this vulnerability?

The immediate step to mitigate this vulnerability is to update the 'Order Notification for WooCommerce' plugin to version 3.6.3 or later, where the issue has been fixed.

Until the update can be applied, consider restricting access to the WooCommerce REST API endpoints by implementing authentication or IP-based access controls to prevent unauthenticated requests.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

This vulnerability allows unauthenticated attackers to gain full read and write access to sensitive store resources such as products, coupons, and customer data. Such unauthorized access to customer information and store data can lead to violations of data protection regulations like GDPR and HIPAA, which require strict controls over personal and sensitive data to prevent unauthorized access and ensure data confidentiality and integrity.

By bypassing authentication and permission checks, the vulnerability undermines the security controls necessary for compliance with these standards, potentially exposing personal data to unauthorized parties and increasing the risk of data breaches.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart