CVE-2025-7642
Simpler Checkout 0.7.0 - 1.1.9 - Authentication Bypass
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
The Simpler Checkout plugin for WordPress is vulnerable to Authentication Bypass in versions 0.7.0 to 1.1.9. This is due to the plugin not properly verifying a user's identity prior to logging them in as an admin through the simplerwc_woocommerce_order_created() function. This makes it possible for unauthenticated attackers to log in as other users based on their order ID, which can be an administrator if a site admin has placed a test order.
| CWE | CWE-288 |
| Vendor | simplercheckout |
| Product | simpler checkout |
| Published | Aug 23, 2025 |
| Last Updated | Aug 25, 2025 |
Stay Ahead of the Next One
Get instant alerts for simplercheckout simpler checkout
Be the first to know when new critical vulnerabilities affecting simplercheckout simpler checkout are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
simplercheckout / Simpler Checkout
0.7.0 โค 1.1.9
References
Credits
Kenneth Dunn