CVE-2025-15565
Received Received - Intake
Authorization Bypass in Nexi XPay Plugin Allows Order Manipulation

Publication date: 2026-04-14

Last updated on: 2026-04-14

Assigner: Wordfence

Description
The Nexi XPay plugin for WordPress is vulnerable to unauthorized modification of data due to missing authorization checks on the redirect function in all versions up to, and including, 8.3.0. This makes it possible for unauthenticated attackers to mark pending WooCommerce orders as paid/completed.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-14
Last Modified
2026-04-14
Generated
2026-05-07
AI Q&A
2026-04-15
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
nexi xpay to 8.3.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

The Nexi XPay plugin for WordPress has a vulnerability due to missing authorization checks on its redirect function in all versions up to and including 8.3.0.

This flaw allows unauthenticated attackers to modify data by marking pending WooCommerce orders as paid or completed without proper authorization.


How can this vulnerability impact me? :

This vulnerability can allow attackers to fraudulently mark pending WooCommerce orders as paid or completed.

As a result, it can lead to unauthorized order processing, potential financial loss, and disruption of normal e-commerce operations.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart