Description
The Float Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to improper error handling in the verifyFloatResponse() function in all versions up to, and including, 1.1.9. This makes it possible for unauthenticated attackers to mark any WooCommerce order as failed.
Published: 2026-01-14
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized Order Status Manipulation
Action: Immediate Patch
AI Analysis

Impact

The Float Payment Gateway plugin for WordPress allows unauthenticated attackers to mark any WooCommerce order as failed due to improper error handling in the verifyFloatResponse() function. This authorization bypass vulnerability (CWE-863) lets an attacker alter order status without possessing valid credentials, potentially triggering refunds, voids, or other financial misrepresentations and undermining the integrity of transactional data.

Affected Systems

Vendor Float Technologies. Product Float Payment Gateway plugin for WordPress. Versions up to and including 1.1.9 are affected. The vulnerability exists in all WordPress sites that use these versions of the plugin.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity. The EPSS score of less than 1% suggests a very low probability of exploitation, and the vulnerability is not listed in the CISA KEV catalog. Attackers can exploit the flaw by sending crafted requests that trigger the verifyFloatResponse() routine, which is reachable without authentication. The lack of proper authorization checks allows the manipulation of order status data, presenting a medium risk if the plugin is active on a live e‑commerce site.

Generated by OpenCVE AI on April 20, 2026 at 21:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Float Payment Gateway plugin to version 1.2.0 or later where the error handling in verifyFloatResponse() has been corrected.
  • Keep the WordPress installation and all other plugins up‑to‑date to prevent related vulnerabilities that could be leveraged in conjunction with this flaw.
  • Leverage a web application firewall or security plugin to detect and block unauthenticated attempts to alter order status and to log any such incidents for further investigation.

Generated by OpenCVE AI on April 20, 2026 at 21:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 18:30:00 +0000


Thu, 15 Jan 2026 08:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Wed, 14 Jan 2026 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 14 Jan 2026 07:00:00 +0000

Type Values Removed Values Added
Description The Float Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to improper error handling in the verifyFloatResponse() function in all versions up to, and including, 1.1.9. This makes it possible for unauthenticated attackers to mark any WooCommerce order as failed.
Title Float Payment Gateway <= 1.1.9 - Improper Authorization to Unauthenticated Order Status Manipulation
Weaknesses CWE-863
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:16:31.375Z

Reserved: 2026-01-12T12:10:48.753Z

Link: CVE-2025-15513

cve-icon Vulnrichment

Updated: 2026-01-14T20:30:24.813Z

cve-icon NVD

Status : Deferred

Published: 2026-01-14T07:16:14.433

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-15513

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-20T21:15:20Z

Weaknesses