Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 04 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Chapaet
Chapaet chapa Payment Gateway Plugin For Woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Chapaet
Chapaet chapa Payment Gateway Plugin For Woocommerce Wordpress Wordpress wordpress |
Wed, 04 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Chapa Payment Gateway Plugin for WooCommerce plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.0.3 via 'chapa_proceed' WooCommerce API endpoint. This makes it possible for unauthenticated attackers to extract sensitive data including the merchant's Chapa secret API key. | |
| Title | Chapa Payment Gateway Plugin for WooCommerce <= 1.0.3 - Unauthenticated Sensitive Information Exposure | |
| Weaknesses | CWE-200 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T16:37:45.305Z
Reserved: 2026-01-07T19:59:46.779Z
Link: CVE-2025-15482
Updated: 2026-02-04T16:19:00.461Z
Status : Deferred
Published: 2026-02-04T09:15:51.033
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-15482
No data.
OpenCVE Enrichment
Updated: 2026-04-22T15:45:20Z