Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Fri, 05 Dec 2025 21:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress |
|
| Vendors & Products |
Wordpress
Wordpress wordpress |
Fri, 05 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 05 Dec 2025 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Payaza plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'wp_ajax_nopriv_update_order_status' AJAX endpoint in all versions up to, and including, 0.3.8. This makes it possible for unauthenticated attackers to update order statuses. | |
| Title | Payaza <= 0.3.8 - Missing Authorization to Unauthenticated Order Status Update | |
| Weaknesses | CWE-862 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:14:58.326Z
Reserved: 2025-10-27T15:32:06.345Z
Link: CVE-2025-12355
Updated: 2025-12-05T13:41:38.558Z
Status : Deferred
Published: 2025-12-05T07:16:10.660
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-12355
No data.
OpenCVE Enrichment
Updated: 2026-04-21T01:15:20Z