Description
The Helloprint plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.1.2. This is due to the plugin registering a public REST API endpoint without implementing authorization checks to verify request authenticity. This makes it possible for unauthenticated attackers to arbitrarily modify WooCommerce order statuses via the /wp-json/helloprint/v1/complete_order_from_helloprint_callback endpoint by providing a valid order reference ID.
Problem types
Product status
* (semver)
Timeline
| 2025-12-05: | Disclosed |
Credits
Md. Moniruzzaman Prodhan
References
www.wordfence.com/...-6ee3-4a1a-b165-439a9135b059?source=cve
plugins.trac.wordpress.org/...lers/Admin/OrderController.php
plugins.trac.wordpress.org/...lers/Admin/OrderController.php