Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 19:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Masteriyo
Masteriyo masteriyo Lms – Online Course Builder For Elearning, Lms & Education Wordpress Wordpress wordpress |
|
| Vendors & Products |
Masteriyo
Masteriyo masteriyo Lms – Online Course Builder For Elearning, Lms & Education Wordpress Wordpress wordpress |
Wed, 08 Apr 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 08 Apr 2026 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Masteriyo LMS – Online Course Builder for eLearning, LMS & Education plugin for WordPress is vulnerable to Authorization Bypass Through User-Controlled Key in versions up to and including 2.1.7. This is due to insufficient webhook signature verification in the handle_webhook() function. The webhook endpoint processes unauthenticated requests and only performs signature verification if both the webhook_secret setting is configured AND the HTTP_STRIPE_SIGNATURE header is present. Since webhook_secret defaults to an empty string, the webhook processes attacker-controlled JSON payloads without any verification. This makes it possible for unauthenticated attackers to send fake Stripe webhook events with arbitrary order_id values in the metadata, mark any order as completed without payment, and gain unauthorized access to paid course content. | |
| Title | Masteriyo LMS <= 2.1.7 - Unauthenticated Authorization Bypass to Arbitrary Order Completion via Stripe Webhook Endpoint | |
| Weaknesses | CWE-639 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:17:31.736Z
Reserved: 2026-03-30T15:04:11.752Z
Link: CVE-2026-5167
Updated: 2026-04-08T14:48:02.688Z
Status : Deferred
Published: 2026-04-08T07:16:22.853
Modified: 2026-04-27T19:04:22.650
Link: CVE-2026-5167
No data.
OpenCVE Enrichment
Updated: 2026-04-08T19:43:38Z