๐Ÿ” CVE Alert

CVE-2026-3641

MEDIUM 5.3

Appmax <= 1.0.3 - Missing Authorization to Order Status Manipulation and Arbitrary Order Creation via Webhook Endpoint

CVSS Score
5.3
EPSS Score
0.0%
EPSS Percentile
0th

The Appmax plugin for WordPress is vulnerable to Improper Input Validation in all versions up to, and including, 1.0.3. This is due to the plugin registering a public REST API webhook endpoint at /webhook-system without implementing webhook signature validation, secret verification, or any mechanism to authenticate that incoming webhook requests genuinely originate from the legitimate Appmax payment service. The plugin directly processes untrusted attacker-controlled input from the 'event' and 'data' parameters without verifying the webhook's authenticity. This makes it possible for unauthenticated attackers to craft malicious webhook payloads that can modify the status of existing WooCommerce orders (e.g., changing them to processing, refunded, cancelled, or pending), create entirely new WooCommerce orders with arbitrary data, create new WooCommerce products with attacker-controlled names/descriptions/prices, and write arbitrary values to order post metadata by spoofing legitimate webhook events.

CWE CWE-20
Vendor appmaxplataforma
Product appmax
Published Mar 21, 2026
Last Updated Apr 8, 2026
Stay Ahead of the Next One

Get instant alerts for appmaxplataforma appmax

Be the first to know when new medium vulnerabilities affecting appmaxplataforma appmax are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

appmaxplataforma / Appmax
0 โ‰ค 1.0.3

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
wordfence.com: https://www.wordfence.com/threat-intel/vulnerabilities/id/6bf61bb7-f977-4afe-bb81-e6de12e00b03?source=cve plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/appmax/trunk/includes/core/class-appmax-payments-webhook.php#L18 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/appmax/tags/1.0.3/includes/core/class-appmax-payments-webhook.php#L18 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/appmax/trunk/includes/core/class-appmax-payments-webhook.php#L28 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/appmax/tags/1.0.3/includes/core/class-appmax-payments-webhook.php#L28 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/appmax/trunk/includes/webhooks/class-appmax-payments-webhook-events.php#L103 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/appmax/tags/1.0.3/includes/webhooks/class-appmax-payments-webhook-events.php#L103 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/appmax/trunk/includes/webhooks/types/class-appmax-payments-order-paid.php#L56 plugins.trac.wordpress.org: https://plugins.trac.wordpress.org/browser/appmax/tags/1.0.3/includes/webhooks/types/class-appmax-payments-order-paid.php#L56

Credits

Yoschanin Pulsirivong Ronnachai Sretawat Na Ayutaya Ronnachai Chaipha