Impact
The vulnerability resides in the Rede Itaú for WooCommerce plugin, where callbacks from the payment gateway are not authenticated. An attacker can send arbitrary requests to modify a WooCommerce order status, marking unpaid orders as paid or causing paid orders to appear failed. This compromises the integrity of the sales ledger and could lead to revenue loss or refunds.
Affected Systems
The affected software is the Rede Itaú for WooCommerce plugin for WordPress, versions up to and including 5.1.2. No other products or vendors are listed.
Risk and Exploitability
The CVSS score of 5.3 indicates moderate severity, but the EPSS score of less than 1% shows low probability of exploitation. The vulnerability is not currently in the CISA KEV catalog. Attackers do not require authentication and can trigger the flaw by sending crafted callbacks to the plugin's endpoint, directly changing order states.
OpenCVE Enrichment