The Nexi XPay plugin for WordPress is vulnerable to unauthorized modification of data due to missing authorization checks on the redirect function in all versions up to, and including, 8.3.0. This makes it possible for unauthenticated attackers to mark pending WooCommerce orders as paid/completed.
History

Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Cartasi
Cartasi nexi Xpay
Wordpress
Wordpress wordpress
Vendors & Products Cartasi
Cartasi nexi Xpay
Wordpress
Wordpress wordpress

Wed, 15 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 14 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description The Nexi XPay plugin for WordPress is vulnerable to unauthorized modification of data due to missing authorization checks on the redirect function in all versions up to, and including, 8.3.0. This makes it possible for unauthenticated attackers to mark pending WooCommerce orders as paid/completed.
Title Nexi XPay <= 8.3.0 - Missing Authorization to Unauthenticated Order Status Modification
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2026-04-14T21:26:40.111Z

Updated: 2026-04-15T13:33:09.315Z

Reserved: 2026-02-05T21:54:02.953Z

Link: CVE-2025-15565

cve-icon Vulnrichment

Updated: 2026-04-15T13:33:06.138Z

cve-icon NVD

Status : Received

Published: 2026-04-14T22:16:27.727

Modified: 2026-04-14T22:16:27.727

Link: CVE-2025-15565

cve-icon Redhat

No data.