CVE-2026-3641

Published: Mar 21, 2026 Last Modified: Mar 21, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 5,3
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: low
Availability: none

Description

AI Translation Available

The Appmax plugin for WordPress is vulnerable to Improper Input Validation in all versions up to, and including, 1.0.3. This is due to the plugin registering a public REST API webhook endpoint at /webhook-system without implementing webhook signature validation, secret verification, or any mechanism to authenticate that incoming webhook requests genuinely originate from the legitimate Appmax payment service. The plugin directly processes untrusted attacker-controlled input from the 'event' and 'data' parameters without verifying the webhook's authenticity. This makes it possible for unauthenticated attackers to craft malicious webhook payloads that can modify the status of existing WooCommerce orders (e.g., changing them to processing, refunded, cancelled, or pending), create entirely new WooCommerce orders with arbitrary data, create new WooCommerce products with attacker-controlled names/descriptions/prices, and write arbitrary values to order post metadata by spoofing legitimate webhook events.

20

Improper Input Validation

Stable
Common Consequences
Security Scopes Affected:
Availability Confidentiality Integrity
Potential Impacts:
Dos: Crash, Exit, Or Restart Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Read Memory Read Files Or Directories Modify Memory Execute Unauthorized Code Or Commands
Applicable Platforms
All platforms may be affected
View CWE Details
https://plugins.trac.wordpress.org/browser/appmax/tags/1.0.3/includes/core/clas…
https://plugins.trac.wordpress.org/browser/appmax/tags/1.0.3/includes/core/clas…
https://plugins.trac.wordpress.org/browser/appmax/tags/1.0.3/includes/webhooks/…
https://plugins.trac.wordpress.org/browser/appmax/tags/1.0.3/includes/webhooks/…
https://plugins.trac.wordpress.org/browser/appmax/trunk/includes/core/class-app…
https://plugins.trac.wordpress.org/browser/appmax/trunk/includes/core/class-app…
https://plugins.trac.wordpress.org/browser/appmax/trunk/includes/webhooks/class…
https://plugins.trac.wordpress.org/browser/appmax/trunk/includes/webhooks/types…
https://www.wordfence.com/threat-intel/vulnerabilities/id/6bf61bb7-f977-4afe-bb…