Description
The Masteriyo LMS – Online Course Builder for eLearning, LMS & Education plugin for WordPress is vulnerable to Authorization Bypass Through User-Controlled Key in versions up to and including 2.1.7. This is due to insufficient webhook signature verification in the handle_webhook() function. The webhook endpoint processes unauthenticated requests and only performs signature verification if both the webhook_secret setting is configured AND the HTTP_STRIPE_SIGNATURE header is present. Since webhook_secret defaults to an empty string, the webhook processes attacker-controlled JSON payloads without any verification. This makes it possible for unauthenticated attackers to send fake Stripe webhook events with arbitrary order_id values in the metadata, mark any order as completed without payment, and gain unauthorized access to paid course content.
Problem types
CWE-639 Authorization Bypass Through User-Controlled Key
Product status
Any version
Timeline
| 2026-03-30: | Vendor Notified |
| 2026-04-07: | Disclosed |
Credits
Md. Moniruzzaman Prodhan
References
www.wordfence.com/...-b695-4e9d-b25a-d1b302be1fec?source=cve
plugins.trac.wordpress.org/.../addons/stripe/StripeAddon.php
plugins.trac.wordpress.org/.../addons/stripe/StripeAddon.php
plugins.trac.wordpress.org/.../addons/stripe/StripeAddon.php
plugins.trac.wordpress.org/.../addons/stripe/StripeAddon.php
plugins.trac.wordpress.org/.../addons/stripe/StripeAddon.php