Home

Description

The Aplazo Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the check_success_response() function in all versions up to, and including, 1.4.2. This makes it possible for unauthenticated attackers to set any WooCommerce order to `pending payment` status.

PUBLISHED Reserved 2026-01-12 | Published 2026-01-14 | Updated 2026-01-14 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2025-12-15:Discovered
2026-01-13:Disclosed

Credits

Md. Moniruzzaman Prodhan finder

References

www.wordfence.com/...-7a72-4cc3-a4db-a693469f6917?source=cve

plugins.trac.wordpress.org/...module/class-aplazo-module.php

cve.org (CVE-2025-15512)

nvd.nist.gov (CVE-2025-15512)

Download JSON