Impact
The Helloprint plugin for WordPress contains a missing authorization check on a public REST API endpoint. The endpoint /wp-json/helloprint/v1/complete_order_from_helloprint_callback allows any user, even unauthenticated, to provide a valid order reference ID and arbitrarily change the status of a WooCommerce order. The ability to modify order status without permission can lead to fraudulent transaction processing, revenue loss, or account manipulation.
Affected Systems
This vulnerability affects the Helloprint WordPress plugin version 2.1.2 and all earlier releases. Users running any of those plugin versions on a WordPress site with WooCommerce enabled are susceptible.
Risk and Exploitability
The CVSS score of 5.3 indicates a moderate impact, but the EPSS score of less than 1% suggests a low probability of exploitation at this time. The vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the weakness by sending unauthenticated HTTP requests to the vulnerable endpoint, bypassing any ownership or permission checks.
OpenCVE Enrichment