CVE-2025-15565
Authorization Bypass in Nexi XPay Plugin Allows Order Manipulation
Publication date: 2026-04-14
Last updated on: 2026-04-14
Assigner: Wordfence
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| nexi | xpay | to 8.3.0 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-862 | The product does not perform an authorization check when an actor attempts to access a resource or perform an action. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
The Nexi XPay plugin for WordPress has a vulnerability due to missing authorization checks on its redirect function in all versions up to and including 8.3.0.
This flaw allows unauthenticated attackers to modify data by marking pending WooCommerce orders as paid or completed without proper authorization.
How can this vulnerability impact me? :
This vulnerability can allow attackers to fraudulently mark pending WooCommerce orders as paid or completed.
As a result, it can lead to unauthorized order processing, potential financial loss, and disruption of normal e-commerce operations.