Impact
The Aplazo Payment Gateway plugin for WordPress contains a missing capability check in the check_success_response() function, which allows an una user to alter the status of any WooCommerce order to pending payment. This unauthorized modification undermines order integrity and can lead to fraudulent transactions or revenue loss. The weakness is classified as CWE‑862, a lack of authorization.
Affected Systems
The vulnerability affects installations of the Aplazo Payment Gateway WordPress plugin up to and including version 1.4.3. Any site that has not upgraded beyond 1.4.3 is susceptible. No other product versions are listed as impacted.
Risk and Exploitability
The CVSS score of 5.3 indicates medium severity, and the EPSS score of less than 1 % suggests a low likelihood of exploitation. The flaw is not currently listed in the CISA KEV catalog. The likely attack vector is an unauthenticated HTTP request that triggers the vulnerable function; due to the missing authorization check, an attacker can manipulate order status without authentication.
OpenCVE Enrichment