The Soisy Pagamento Rateale plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the parseRemoteRequest function in versions up to, and including, 6.0.1. This makes it possible for unauthenticated attackers with knowledge of an existing WooCommerce Order ID to expose sensitive WooCommerce order information (e.g., Name, Address, Email Address, and other order metadata).
History

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
Title Soisy Pagamento Rateale <= 6.0.1 - Missing Authorization to Sensitive Information Exposure
References

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:25:41.662Z

Reserved: 2023-09-22T16:20:49.833Z

Link: CVE-2023-5132

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-10-21T02:15:07.960

Modified: 2026-04-08T19:18:43.823

Link: CVE-2023-5132

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.