The Float Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to improper error handling in the verifyFloatResponse() function in all versions up to, and including, 1.1.9. This makes it possible for unauthenticated attackers to mark any WooCommerce order as failed.
Metrics
Affected Vendors & Products
References
History
Thu, 15 Jan 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Wed, 14 Jan 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 14 Jan 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Float Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to improper error handling in the verifyFloatResponse() function in all versions up to, and including, 1.1.9. This makes it possible for unauthenticated attackers to mark any WooCommerce order as failed. | |
| Title | Float Payment Gateway <= 1.1.9 - Improper Authorization to Unauthenticated Order Status Manipulation | |
| Weaknesses | CWE-863 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2026-01-14T06:40:07.126Z
Updated: 2026-01-14T20:30:29.106Z
Reserved: 2026-01-12T12:10:48.753Z
Link: CVE-2025-15513
Updated: 2026-01-14T20:30:24.813Z
Status : Awaiting Analysis
Published: 2026-01-14T07:16:14.433
Modified: 2026-01-14T16:25:12.057
Link: CVE-2025-15513
No data.