The Helloprint plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.1.2. This is due to the plugin registering a public REST API endpoint without implementing authorization checks to verify request authenticity. This makes it possible for unauthenticated attackers to arbitrarily modify WooCommerce order statuses via the /wp-json/helloprint/v1/complete_order_from_helloprint_callback endpoint by providing a valid order reference ID.
Metrics
Affected Vendors & Products
References
History
Sat, 06 Dec 2025 06:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Helloprint plugin for WordPress is vulnerable to Missing Authorization in versions up to, and including, 2.1.2. This is due to the plugin registering a public REST API endpoint without implementing authorization checks to verify request authenticity. This makes it possible for unauthenticated attackers to arbitrarily modify WooCommerce order statuses via the /wp-json/helloprint/v1/complete_order_from_helloprint_callback endpoint by providing a valid order reference ID. | |
| Title | Helloprint <= 2.1.2 - Missing Authorization to Unauthenticated Arbitrary Order Status Modification | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-12-06T05:49:27.167Z
Updated: 2025-12-06T05:49:27.167Z
Reserved: 2025-11-25T16:36:32.211Z
Link: CVE-2025-13666
No data.
Status : Received
Published: 2025-12-06T06:15:52.267
Modified: 2025-12-06T06:15:52.267
Link: CVE-2025-13666
No data.