WordPress Stripe Payment Gateway Plugin Leaves Nearly 900,000 Installations Worldwide Vulnerable to IDOR Attack

WordPress is one of the most popular website builders that provides individuals and businesses with a platform for creating their own websites. The platform offers various themes, plugins, and features that can be added to a website to enhance its functionality and design. One such plugin is the WooCommerce Stripe Gateway Plugin, which allows users to keep customers on their WordPress site during payment. Unfortunately, this plugin has a vulnerability that exposes nearly 900,000 installations worldwide to an unauthenticated insecure direct object reference (IDOR) attack.

Vulnerability Description: Unauthenticated Insecure Direct Object Reference (IDOR) in WordPress Stripe Payment Gateway Plugin

Insecure Direct Object Reference (IDOR) is a security flaw in an application that occurs when the application exposes a reference to an internal object in such a way that attackers can manipulate the object. In the case of the WordPress Stripe Payment Gateway Plugin, a vulnerability was discovered that allows an attacker to retrieve sensitive information from the database without proper authentication.

Plugin Information: Version 7.4.1 and 900K Installations Worldwide

The WordPress Stripe Payment Gateway Plugin is a popular plugin used by nearly 900,000 installations worldwide. The plugin version that is vulnerable to the IDOR attack is 7.4.0 and below. It is essential to note that the vulnerability was discovered in version 7.4.0 and is not present in higher versions of the plugin.

The purpose of using the WooCommerce Stripe Gateway Plugin is to keep customers on the WordPress site during the payment process. This is achieved by providing a secure payment gateway that prevents customers from being redirected to third-party sites, offering a seamless and effortless shopping experience.

Exploitation Method: Retrieving Sensitive Information from Database using javascript_params and payment_fields function

The vulnerability in the WooCommerce Stripe Gateway Plugin is caused by a flaw in the javascript_params and payment_fields function. An attacker can exploit these functions to retrieve sensitive information from the database. Since this vulnerability can be exploited without authentication, it poses a severe risk.

Severity Level: Exposure of Sensitive Data is Considered Serious and may Lead to More Attacks

Exposure of the above data is considered serious. Once sensitive information, such as credit card numbers, is retrieved by an attacker, it can be used to conduct fraudulent activities and compromise the security of online transactions. The vulnerability can lead to more attacks if not addressed promptly.

Affected Product: WordPress Stripe Gateway Plugin Version 7.4.0 and Below

The vulnerability exists in the WordPress Stripe Gateway Plugin version 7.4.0 and below. Hence, users who have installed this version or below are at risk of being compromised.

Solution available

Fixed in Version 7.4.1. The necessary updates to address this flaw have been made available by WooCommerce. The vulnerability has been fixed in version 7.4.1. Users are advised to upgrade to version 7.4.1, which addresses this flaw.

WordPress has responded to the vulnerability by releasing version 7.4.1, which fixes the flaw. The company has also advised users to upgrade to the latest version to ensure the security of their online transactions.

Statistics

More than half of all active plugin installations use a vulnerable version, according to statistics compiled by WordPress.org. This indicates that the majority of users are at risk and must update their plugin immediately.

To conclude, the WordPress Stripe Gateway Plugin has a vulnerability that exposes nearly 900K installations worldwide to an Unauthenticated Insecure Direct Object Reference (IDOR) attack. The flaw exists in version 7.4.0 and below. It is recommended that users upgrade to version 7.4.1 to address this issue. Failure to update the plugin exposes users to the risk of sensitive information being accessed by an attacker, leading to fraudulent activities and compromise of online transactions. Keeping your WordPress plugins up-to-date is essential to ensuring the security of your website and preventing vulnerabilities from being exploited.

Explore more

Trend Analysis: Rising Home Insurance Premiums

Mortgage math changed in an unexpected place as homeowners insurance, once an afterthought, began deciding who could buy, where deals penciled out, and which protections actually fit a strained budget. Premiums rose nearly 6% year over year, pushing a once-modest line item to center stage just as some affordability metrics softened and inventories stabilized. The shift mattered because first-time buyers

Business Central 2026 Turns ERP From Record to Action

Closing books no longer feels like a relay of spreadsheets and emails because the ERP now proposes, performs, and proves the work before teams even ask. Mid-market leaders have watched their systems shift from passive ledgers to orchestration engines, where AI, automation, and embedded analytics move decisions into the flow of Outlook, Excel, and Teams. This report examines how Dynamics

Proactive Support Slashes Business Central Disruptions

Missed shipments, frozen screens, and mystery integration errors drain cash and credibility long before a ticket is filed, yet SMBs running Business Central can reverse that spiral by shifting from firefighting to a steady, proactive cadence. The payoff is simple and compelling: fewer surprises, faster pages, steadier integrations, and lower support costs that stop creeping into every department’s budget. Reactive

Trend Analysis: Agentic AI in Software Engineering

Weeks collapsed into hours as agentic AI rewired Motorway’s delivery engine, turning cautious release trains into a high-velocity, test-anchored pipeline that ships faster and breaks less, while reframing code itself as disposable fuel for evaluation rather than an artifact to preserve. The shift mattered because volume without discipline creates fragility; Motorway’s answer—spec-first rigor, governance-as-code, and lifecycle integration—revealed how to unlock

Check Point and Google Cloud Secure Autonomous AI Agents

Why Governance-Led Agent Security Is Becoming a Market Standard Budgets for AI have shifted toward agents that act without hand-holding, forcing security teams to judge not only who connects but exactly what machine-led steps unfold across tools, data, and workflows. That shift raised the stakes: value climbed with automation, yet exposure grew as agents gained power to call APIs, trigger