Home

Description

The Masteriyo LMS – Online Course Builder for eLearning, LMS & Education plugin for WordPress is vulnerable to Authorization Bypass Through User-Controlled Key in versions up to and including 2.1.7. This is due to insufficient webhook signature verification in the handle_webhook() function. The webhook endpoint processes unauthenticated requests and only performs signature verification if both the webhook_secret setting is configured AND the HTTP_STRIPE_SIGNATURE header is present. Since webhook_secret defaults to an empty string, the webhook processes attacker-controlled JSON payloads without any verification. This makes it possible for unauthenticated attackers to send fake Stripe webhook events with arbitrary order_id values in the metadata, mark any order as completed without payment, and gain unauthorized access to paid course content.

PUBLISHED Reserved 2026-03-30 | Published 2026-04-08 | Updated 2026-04-08 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-639 Authorization Bypass Through User-Controlled Key

Product status

Default status
unaffected

Any version
affected

Timeline

2026-03-30:Vendor Notified
2026-04-07:Disclosed

Credits

Md. Moniruzzaman Prodhan finder

References

www.wordfence.com/...-b695-4e9d-b25a-d1b302be1fec?source=cve

plugins.trac.wordpress.org/.../addons/stripe/StripeAddon.php

plugins.trac.wordpress.org/.../addons/stripe/StripeAddon.php

plugins.trac.wordpress.org/.../addons/stripe/StripeAddon.php

plugins.trac.wordpress.org/.../addons/stripe/StripeAddon.php

plugins.trac.wordpress.org/.../addons/stripe/StripeAddon.php

cve.org (CVE-2026-5167)

nvd.nist.gov (CVE-2026-5167)

Download JSON