Description
The Order Notification for WooCommerce WordPress plugin before 3.6.3 overrides WooCommerce's permission checks to grant full access to all unauthenticated requests, enabling complete read/write access to store resources like products, coupons, and customers.
Published: 2026-04-01
Score: 9.1 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated REST API permission bypass
Action: Immediate Patch
AI Analysis

Impact

The Order Notification for WooCommerce plugin before version 3.6.3 alters WooCommerce’s built‑in permission checks, allowing attackers to use the REST API without any credentials. This flaw grants complete read and write access to store resources such as products, coupons, and customer data, effectively giving an unauthenticated user full administrative control over the e‑commerce site.

Affected Systems

All installations of the Order Notification for WooCommerce WordPress plugin with versions earlier than 3.6.3 are affected. Site owners running these legacy plugin versions rely on the plugin’s notification features, which in turn replace WooCommerce’s default permission logic for REST endpoints.

Risk and Exploitability

The CVSS score of 9.1 classifies this as a critical vulnerability, but its EPSS score of less than 1% indicates a low current exploitation likelihood. The flaw is not listed in the CISA KEV catalog. Attackers can exploit the vulnerability by issuing unauthenticated REST requests to endpoints such as /wp-json/wc/v3/products or /wp-json/wc/v3/customers, achieving full CRUD capability on the store.

Generated by OpenCVE AI on April 2, 2026 at 02:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the Order Notification for WooCommerce plugin to version 3.6.3 or later.
  • If an immediate update is not possible, deactivate the plugin to block the bypassed permission checks.
  • After update or deactivation, verify that WooCommerce REST API endpoints enforce authentication and consider restricting API access to trusted IP ranges.

Generated by OpenCVE AI on April 2, 2026 at 02:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 03 Apr 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Order Notification For Woocommerce
Order Notification For Woocommerce order Notification For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Order Notification For Woocommerce
Order Notification For Woocommerce order Notification For Woocommerce
Wordpress
Wordpress wordpress

Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-287
Metrics cvssV3_1

{'score': 9.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 01 Apr 2026 06:15:00 +0000

Type Values Removed Values Added
Description The Order Notification for WooCommerce WordPress plugin before 3.6.3 overrides WooCommerce's permission checks to grant full access to all unauthenticated requests, enabling complete read/write access to store resources like products, coupons, and customers.
Title Order Notification for WooCommerce < 3.6.3 - Unauthenticated WooCommerce REST Permission Bypass
References

Subscriptions

Order Notification For Woocommerce Order Notification For Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-01T14:03:41.137Z

Reserved: 2026-01-07T22:08:07.507Z

Link: CVE-2025-15484

cve-icon Vulnrichment

Updated: 2026-04-01T14:03:25.608Z

cve-icon NVD

Status : Deferred

Published: 2026-04-01T06:16:14.133

Modified: 2026-04-15T15:05:47.827

Link: CVE-2025-15484

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-03T08:58:47Z

Weaknesses