Description
The Fortis for WooCommerce plugin for WordPress is vulnerable to authorization bypass due to an inverted nonce check in the 'check_fortis_notify_response' function in all versions up to, and including, 1.2.0. This makes it possible for unauthenticated attackers to update arbitrary WooCommerce order statuses to paid/processing/completed, effectively allowing them to mark orders as paid without payment.
Published: 2026-02-04
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Authorization bypass that allows unauthenticated users to change order status to paid
Action: Patch Now
AI Analysis

Impact

The Fortis for WooCommerce WordPress plugin contains an authorization bypass vulnerability due to an inverted nonce check in the check_fortis_notify_response function. This flaw permits unauthenticated attackers to modify WooCommerce order states, allowing them to set arbitrary orders to paid, processing, or completed without actually providing payment. As a result, attackers can fraudulently clear orders, causing financial loss and eroding trust in the e-commerce system. This weakness is classified as CWE-862: Missing Authorization.

Affected Systems

Affected installations are any sites running Fortis for WooCommerce version 1.2.0 or earlier, which is the last version containing the vulnerable code. The vendor, Fortispay, distributed the plugin through the WordPress plugin repository, and the flaw spans all releases up to and including 1.2.0. Site owners should verify the plugin version and upgrade accordingly.

Risk and Exploitability

The vulnerability has a CVSS score of 5.3, indicating moderate severity, while the EPSS score of less than 1% suggests a low exploitation likelihood at present. Because the flaw can be triggered by unauthenticated HTTP requests to the wc-api endpoint, attackers need only make a crafted request containing an order ID; no authentication or special privileges are required. The issue is not listed in CISA’s KEV catalog, implying no confirmed exploitation reports yet, but the risk remains high for sites that expose the endpoint to the public internet.

Generated by OpenCVE AI on April 15, 2026 at 18:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Fortis for WooCommerce plugin to the latest version (≥1.2.1) where the nonce check has been corrected.
  • Ensure that any custom code or hooks that modify order status updates enforce proper authorization checks before allowing status changes.
  • If an immediate upgrade is not possible, restrict unauthenticated access to the wc-api endpoint using server rules or a security plugin to prevent status changes without authentication.

Generated by OpenCVE AI on April 15, 2026 at 18:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:45:00 +0000


Wed, 04 Feb 2026 21:30:00 +0000

Type Values Removed Values Added
First Time appeared Fortispay
Fortispay fortis For Woocommerce
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Fortispay
Fortispay fortis For Woocommerce
Woocommerce
Woocommerce woocommerce
Wordpress
Wordpress wordpress

Wed, 04 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 04 Feb 2026 08:45:00 +0000

Type Values Removed Values Added
Description The Fortis for WooCommerce plugin for WordPress is vulnerable to authorization bypass due to an inverted nonce check in the 'check_fortis_notify_response' function in all versions up to, and including, 1.2.0. This makes it possible for unauthenticated attackers to update arbitrary WooCommerce order statuses to paid/processing/completed, effectively allowing them to mark orders as paid without payment.
Title Fortis for WooCommerce <= 1.2.0 - Missing Authorization to Unauthenticated Arbitrary Order Status Update to Paid via 'wc-api' Endpoint
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Fortispay Fortis For Woocommerce
Woocommerce Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:11:54.036Z

Reserved: 2026-01-07T17:46:57.526Z

Link: CVE-2026-0679

cve-icon Vulnrichment

Updated: 2026-02-04T16:51:31.532Z

cve-icon NVD

Status : Deferred

Published: 2026-02-04T09:15:52.143

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-0679

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T19:00:12Z

Weaknesses