Impact
The Float Payment Gateway plugin for WordPress allows unauthenticated attackers to mark any WooCommerce order as failed due to improper error handling in the verifyFloatResponse() function. This authorization bypass vulnerability (CWE-863) lets an attacker alter order status without possessing valid credentials, potentially triggering refunds, voids, or other financial misrepresentations and undermining the integrity of transactional data.
Affected Systems
Vendor Float Technologies. Product Float Payment Gateway plugin for WordPress. Versions up to and including 1.1.9 are affected. The vulnerability exists in all WordPress sites that use these versions of the plugin.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity. The EPSS score of less than 1% suggests a very low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by sending crafted requests that trigger the verifyFloatResponse() routine, which is reachable without authentication. The lack of proper authorization checks allows the manipulation of order status data, presenting a medium risk if the plugin is active on a live e‑commerce site.
OpenCVE Enrichment