The Easy Digital Downloads plugin for WordPress is vulnerable to Order Manipulation in all versions up to, and including, 3.5.2 due to an order verification bypass. The verification is unconditionally skipped when the POST body includes verification_override=1. Because this value is attacker-supplied, an unauthenticated actor can submit a forged IPN and have it treated as verified, even on production sites and with verification otherwise enabled. A valid PayPal transaction id is needed, restricting order manipulation to orders placed by the attacker. This, in turn, requires them to have a customer account.
History

Thu, 06 Nov 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 06 Nov 2025 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Smub
Smub easy Digital Downloads
Wordpress
Wordpress wordpress
Vendors & Products Smub
Smub easy Digital Downloads
Wordpress
Wordpress wordpress

Thu, 06 Nov 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Easy Digital Downloads plugin for WordPress is vulnerable to Order Manipulation in all versions up to, and including, 3.5.2 due to an order verification bypass. The verification is unconditionally skipped when the POST body includes verification_override=1. Because this value is attacker-supplied, an unauthenticated actor can submit a forged IPN and have it treated as verified, even on production sites and with verification otherwise enabled. A valid PayPal transaction id is needed, restricting order manipulation to orders placed by the attacker. This, in turn, requires them to have a customer account.
Title Easy Digital Download <= 3.5.2 - Insufficient Verification to Order Manipulation
Weaknesses CWE-807
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2025-11-06T04:36:22.463Z

Updated: 2025-11-06T15:50:35.023Z

Reserved: 2025-10-03T21:53:31.464Z

Link: CVE-2025-11271

cve-icon Vulnrichment

Updated: 2025-11-06T15:50:30.456Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-06T05:15:54.917

Modified: 2025-11-06T19:45:09.883

Link: CVE-2025-11271

cve-icon Redhat

No data.