The Fortis for WooCommerce WordPress plugin before 1.3.1 may leak sensitive API keys to unauthenticated attackers, allowing them to query Fortis' API and retrieve sensitive customer information, like past orders, PII, etc.
Project Subscriptions
No data.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 19 May 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-200 |
Tue, 19 May 2026 06:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Fortis for WooCommerce WordPress plugin before 1.3.1 may leak sensitive API keys to unauthenticated attackers, allowing them to query Fortis' API and retrieve sensitive customer information, like past orders, PII, etc. | |
| Title | Fortis For WooCommerce < 1.3.1 - Sensitive API Key Disclosure | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2026-05-19T06:00:10.476Z
Reserved: 2026-03-12T20:17:18.395Z
Link: CVE-2025-15609
No data.
Status : Received
Published: 2026-05-19T07:16:29.327
Modified: 2026-05-19T07:16:29.327
Link: CVE-2025-15609
No data.
OpenCVE Enrichment
Updated: 2026-05-19T07:30:44Z
Weaknesses