CVE-2026-5167 PUBLISHED

Masteriyo LMS <= 2.1.7 - Unauthenticated Authorization Bypass to Arbitrary Order Completion via Stripe Webhook Endpoint

Assigner: Wordfence
Reserved: 30.03.2026 Published: 08.04.2026 Updated: 08.04.2026

The Masteriyo LMS – Online Course Builder for eLearning, LMS & Education plugin for WordPress is vulnerable to Authorization Bypass Through User-Controlled Key in versions up to and including 2.1.7. This is due to insufficient webhook signature verification in the handle_webhook() function. The webhook endpoint processes unauthenticated requests and only performs signature verification if both the webhook_secret setting is configured AND the HTTP_STRIPE_SIGNATURE header is present. Since webhook_secret defaults to an empty string, the webhook processes attacker-controlled JSON payloads without any verification. This makes it possible for unauthenticated attackers to send fake Stripe webhook events with arbitrary order_id values in the metadata, mark any order as completed without payment, and gain unauthorized access to paid course content.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS Score: 5.3

Product Status

Vendor masteriyo
Product Masteriyo LMS – Online Course Builder for eLearning, LMS & Education
Versions Default: unaffected
  • affected from 0 to 2.1.7 (incl.)

Credits

  • Md. Moniruzzaman Prodhan finder

References

Problem Types

  • CWE-639 Authorization Bypass Through User-Controlled Key CWE