Home

Description

The Helloprint plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.1.2. This is due to the plugin registering a public REST API endpoint without implementing authorization checks to verify request authenticity. This makes it possible for unauthenticated attackers to arbitrarily modify WooCommerce order statuses via the /wp-json/helloprint/v1/complete_order_from_helloprint_callback endpoint by providing a valid order reference ID.

PUBLISHED Reserved 2025-11-25 | Published 2025-12-06 | Updated 2025-12-06 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-05:Disclosed

Credits

Md. Moniruzzaman Prodhan finder

References

www.wordfence.com/...-6ee3-4a1a-b165-439a9135b059?source=cve

plugins.trac.wordpress.org/...lers/Admin/OrderController.php

plugins.trac.wordpress.org/...lers/Admin/OrderController.php

cve.org (CVE-2025-13666)

nvd.nist.gov (CVE-2025-13666)