Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ipaymu
Ipaymu payment Gateway For Woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Ipaymu
Ipaymu payment Gateway For Woocommerce Wordpress Wordpress wordpress |
Wed, 07 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 07 Jan 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The iPaymu Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authentication in all versions up to, and including, 2.0.2 via the 'check_ipaymu_response' function. This is due to the plugin not validating webhook request authenticity through signature verification or origin checks. This makes it possible for unauthenticated attackers to mark WooCommerce orders as paid by sending crafted POST requests to the webhook endpoint without any payment occurring, as well as enumerate order IDs and obtain valid order keys via GET requests, exposing customer order PII including names, addresses, and purchased products. | |
| Title | iPaymu Payment Gateway for WooCommerce <= 2.0.2 - Missing Authentication to Unauthenticated Payment Bypass and Order Information Disclosure | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-01-07T16:13:46.137Z
Reserved: 2026-01-06T18:32:43.133Z
Link: CVE-2026-0656
Updated: 2026-01-07T14:51:30.248Z
Status : Awaiting Analysis
Published: 2026-01-07T12:17:07.867
Modified: 2026-01-08T18:08:54.147
Link: CVE-2026-0656
No data.
OpenCVE Enrichment
Updated: 2026-01-08T09:49:40Z