The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the parseRemoteRequest function in versions up to, and including, 6.0.1. This makes it possible for unauthenticated attackers with knowledge of an existing WooCommerce Order ID to expose sensitive WooCommerce order information (e.g., Name, Address, Email Address, and other order metadata).

Project Subscriptions

Vendors Products
Soisy Pagamento Rateale Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2023-57470 The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the parseRemoteRequest function in versions up to, and including, 6.0.1. This makes it possible for unauthenticated attackers with knowledge of an existing WooCommerce Order ID to expose sensitive WooCommerce order information (e.g., Name, Address, Email Address, and other order metadata).
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Title Soisy Pagamento Rateale <= 6.0.1 - Missing Authorization to Sensitive Information Exposure
References

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:41.662Z

Reserved: 2023-09-22T16:20:49.833Z

Link: CVE-2023-5132

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-21T02:15:07.960

Modified: 2026-04-08T19:18:43.823

Link: CVE-2023-5132

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses