The Easy Digital Downloads plugin for WordPress is vulnerable to Order Manipulation in all versions up to, and including, 3.5.2 due to an order verification bypass. The verification is unconditionally skipped when the POST body includes verification_override=1. Because this value is attacker-supplied, an unauthenticated actor can submit a forged IPN and have it treated as verified, even on production sites and with verification otherwise enabled. A valid PayPal transaction id is needed, restricting order manipulation to orders placed by the attacker. This, in turn, requires them to have a customer account.
Metrics
Affected Vendors & Products
References
History
Thu, 06 Nov 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 06 Nov 2025 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Smub
Smub easy Digital Downloads Wordpress Wordpress wordpress |
|
| Vendors & Products |
Smub
Smub easy Digital Downloads Wordpress Wordpress wordpress |
Thu, 06 Nov 2025 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Easy Digital Downloads plugin for WordPress is vulnerable to Order Manipulation in all versions up to, and including, 3.5.2 due to an order verification bypass. The verification is unconditionally skipped when the POST body includes verification_override=1. Because this value is attacker-supplied, an unauthenticated actor can submit a forged IPN and have it treated as verified, even on production sites and with verification otherwise enabled. A valid PayPal transaction id is needed, restricting order manipulation to orders placed by the attacker. This, in turn, requires them to have a customer account. | |
| Title | Easy Digital Download <= 3.5.2 - Insufficient Verification to Order Manipulation | |
| Weaknesses | CWE-807 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2025-11-06T04:36:22.463Z
Updated: 2025-11-06T15:50:35.023Z
Reserved: 2025-10-03T21:53:31.464Z
Link: CVE-2025-11271
Updated: 2025-11-06T15:50:30.456Z
Status : Awaiting Analysis
Published: 2025-11-06T05:15:54.917
Modified: 2025-11-06T19:45:09.883
Link: CVE-2025-11271
No data.