CVE-2025-15513
📋 TL;DR
The Float Payment Gateway WordPress plugin has an improper error handling vulnerability that allows unauthenticated attackers to mark any WooCommerce order as failed. This affects all WordPress sites using the plugin version 1.1.9 or earlier. Attackers can disrupt e-commerce operations without authentication.
💻 Affected Systems
- Float Payment Gateway WordPress plugin
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Attackers could systematically mark all orders as failed, causing significant business disruption, customer service issues, and potential revenue loss for e-commerce sites.
Likely Case
Attackers mark random orders as failed, causing customer confusion, support tickets, and minor operational disruption.
If Mitigated
With proper monitoring and quick response, impact is limited to temporary order status issues that can be manually corrected.
🎯 Exploit Status
The vulnerability is in a publicly accessible function with simple exploitation requirements.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.2.0 or later
Vendor Advisory: https://plugins.trac.wordpress.org/browser/float-gateway/tags/1.2.0/
Restart Required: No
Instructions:
1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find Float Payment Gateway. 4. Click 'Update Now' if available. 5. If no update appears, download version 1.2.0+ from WordPress.org and manually update.
🔧 Temporary Workarounds
Disable Float Payment Gateway
allTemporarily disable the vulnerable plugin until patched
wp plugin deactivate float-gateway
Restrict Access via WAF
allBlock requests to the vulnerable endpoint
🧯 If You Can't Patch
- Implement web application firewall rules to block malicious requests to the verifyFloatResponse endpoint
- Increase monitoring of WooCommerce order status changes and implement alerts for suspicious patterns
🔍 How to Verify
Check if Vulnerable:
Check WordPress admin → Plugins → Float Payment Gateway → Version. If version is 1.1.9 or lower, you are vulnerable.
Check Version:
wp plugin get float-gateway --field=version
Verify Fix Applied:
After updating, verify the plugin version shows 1.2.0 or higher in WordPress admin.
📡 Detection & Monitoring
Log Indicators:
- Multiple POST requests to /wp-admin/admin-ajax.php with action=verifyFloatResponse
- Unusual spikes in WooCommerce order status changes to 'failed'
Network Indicators:
- HTTP POST requests to admin-ajax.php with verifyFloatResponse parameter from unexpected IPs
SIEM Query:
source="wordpress.log" AND "verifyFloatResponse" AND response_code=200