The Float Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to improper error handling in the verifyFloatResponse() function in all versions up to, and including, 1.1.9. This makes it possible for unauthenticated attackers to mark any WooCommerce order as failed.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 14 Jan 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Float Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to improper error handling in the verifyFloatResponse() function in all versions up to, and including, 1.1.9. This makes it possible for unauthenticated attackers to mark any WooCommerce order as failed. | |
| Title | Float Payment Gateway <= 1.1.9 - Improper Authorization to Unauthenticated Order Status Manipulation | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-01-14T06:40:07.126Z
Reserved: 2026-01-12T12:10:48.753Z
Link: CVE-2025-15513
No data.
Status : Awaiting Analysis
Published: 2026-01-14T07:16:14.433
Modified: 2026-01-14T16:25:12.057
Link: CVE-2025-15513
No data.
OpenCVE Enrichment
No data.
Weaknesses