Description
An issue was discovered in the CardGate Payments plugin through 3.1.15 for WooCommerce. Lack of origin authentication in the IPN callback processing function in cardgate/cardgate.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-2632 | An issue was discovered in the CardGate Payments plugin through 3.1.15 for WooCommerce. Lack of origin authentication in the IPN callback processing function in cardgate/cardgate.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments. |
Github GHSA |
GHSA-5pq5-9phv-q5j3 | CardGate Payments plugin for WooCommerce does not validate request origin |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T10:12:10.990Z
Reserved: 2020-02-10T00:00:00.000Z
Link: CVE-2020-8819
No data.
Status : Modified
Published: 2020-02-25T02:15:12.160
Modified: 2024-11-21T05:39:30.133
Link: CVE-2020-8819
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD
Github GHSA