The WooCommerce Clover Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the callback_handler function in all versions up to, and including, 1.3.1. This makes it possible for unauthenticated attackers to mark orders as paid.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2024-16419 | The WooCommerce Clover Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the callback_handler function in all versions up to, and including, 1.3.1. This makes it possible for unauthenticated attackers to mark orders as paid. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 27 Feb 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zaytech
Zaytech woocommerce Clover Payment Gateway |
|
| CPEs | cpe:2.3:a:zaytech:woocommerce_clover_payment_gateway:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zaytech
Zaytech woocommerce Clover Payment Gateway |
|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2024-08-01T20:01:07.389Z
Reserved: 2024-01-16T19:43:35.724Z
Link: CVE-2024-0626
Updated: 2024-08-01T18:11:35.690Z
Status : Awaiting Analysis
Published: 2024-04-09T19:15:14.723
Modified: 2024-11-21T08:47:01.817
Link: CVE-2024-0626
No data.
OpenCVE Enrichment
Updated: 2025-07-12T22:23:29Z
Weaknesses
No weakness.
EUVD