CVE-2025-15513

5.3 MEDIUM

📋 TL;DR

The Float Payment Gateway WordPress plugin has an improper error handling vulnerability that allows unauthenticated attackers to mark any WooCommerce order as failed. This affects all WordPress sites using the plugin version 1.1.9 or earlier. Attackers can disrupt e-commerce operations without authentication.

💻 Affected Systems

Products:
  • Float Payment Gateway WordPress plugin
Versions: All versions up to and including 1.1.9
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects WordPress installations with WooCommerce and the Float Payment Gateway plugin active.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could systematically mark all orders as failed, causing significant business disruption, customer service issues, and potential revenue loss for e-commerce sites.

🟠

Likely Case

Attackers mark random orders as failed, causing customer confusion, support tickets, and minor operational disruption.

🟢

If Mitigated

With proper monitoring and quick response, impact is limited to temporary order status issues that can be manually corrected.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability is in a publicly accessible function with simple exploitation requirements.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.2.0 or later

Vendor Advisory: https://plugins.trac.wordpress.org/browser/float-gateway/tags/1.2.0/

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Go to Plugins → Installed Plugins. 3. Find Float Payment Gateway. 4. Click 'Update Now' if available. 5. If no update appears, download version 1.2.0+ from WordPress.org and manually update.

🔧 Temporary Workarounds

Disable Float Payment Gateway

all

Temporarily disable the vulnerable plugin until patched

wp plugin deactivate float-gateway

Restrict Access via WAF

all

Block requests to the vulnerable endpoint

🧯 If You Can't Patch

  • Implement web application firewall rules to block malicious requests to the verifyFloatResponse endpoint
  • Increase monitoring of WooCommerce order status changes and implement alerts for suspicious patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Float Payment Gateway → Version. If version is 1.1.9 or lower, you are vulnerable.

Check Version:

wp plugin get float-gateway --field=version

Verify Fix Applied:

After updating, verify the plugin version shows 1.2.0 or higher in WordPress admin.

📡 Detection & Monitoring

Log Indicators:

  • Multiple POST requests to /wp-admin/admin-ajax.php with action=verifyFloatResponse
  • Unusual spikes in WooCommerce order status changes to 'failed'

Network Indicators:

  • HTTP POST requests to admin-ajax.php with verifyFloatResponse parameter from unexpected IPs

SIEM Query:

source="wordpress.log" AND "verifyFloatResponse" AND response_code=200

🔗 References

📤 Share & Export