Description
The Japanized for WooCommerce plugin for WordPress is vulnerable to Improper Authentication in versions up to, and including, 2.8.4. This is due to a flawed permission check in the `paidy_webhook_permission_check` function that unconditionally returns `true` when the webhook signature header is omitted. This makes it possible for unauthenticated attackers to bypass payment verification and fraudulently mark orders as "Processing" or "Completed" without actual payment via a crafted POST request to the Paidy webhook endpoint.
Published: 2026-02-27
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized order status manipulation
Action: Patch immediately
AI Analysis

Impact

The Japanized for WooCommerce plugin contains an improper authentication flaw whereby the function handling the Paidy webhook bypasses permission checks when the signature header is absented. This flaw allows an unauthenticated user to send a crafted HTTP POST request to the webhook endpoint and alter an order’s status to Processing or Completed without actual payment. The resulting compromise is a fraud scenario in which goods or services are released to a non‑paying party, directly impacting the merchant’s financial integrity. The attack is conducted from outside the site; the attacker only requires network access to the webhook URL and knowledge of the order ID and desired status. The flaw is a classic example of CWE‑287, Improper Authentication.

Affected Systems

The vulnerability affects the WordPress plugin "Japanized for WooCommerce" by shoheitanaka, versions up to and including 2.8.4. All installations running these or older releases are susceptible, regardless of the WooCommerce version. No other products are listed as impacted.

Risk and Exploitability

The CVSS score of 5.3 indicates a medium severity, and the EPSS value of <1% reflects a low current exploitation probability. The vulnerability is not listed in the CISA KEV catalog, suggesting that no widespread, actively observed exploitation has been reported. Nevertheless, the flaw provides a direct path to fraud without requiring any privileged credentials or additional system access. An attacker who can reach the webhook endpoint can change order status in real‑time, potentially causing immediate financial loss and reputational damage.

Generated by OpenCVE AI on April 15, 2026 at 18:01 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the "Japanized for WooCommerce" plugin to the latest version (at least 2.8.5) where the permission check has been corrected.
  • If an update is not yet available, disable the Paidy webhook endpoint or implement server‑side access controls that ensure the signature header is required and validated before processing the request.
  • Deploy application‑level or network‑layer firewall rules to restrict POST traffic to the webhook URL to known IPs or authenticated sessions, mitigating the risk of unauthenticated manipulation.

Generated by OpenCVE AI on April 15, 2026 at 18:01 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Shoheitanaka
Shoheitanaka japanized For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Shoheitanaka
Shoheitanaka japanized For Woocommerce
Wordpress
Wordpress wordpress
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
Description The Japanized for WooCommerce plugin for WordPress is vulnerable to Improper Authentication in versions up to, and including, 2.8.4. This is due to a flawed permission check in the `paidy_webhook_permission_check` function that unconditionally returns `true` when the webhook signature header is omitted. This makes it possible for unauthenticated attackers to bypass payment verification and fraudulently mark orders as "Processing" or "Completed" without actual payment via a crafted POST request to the Paidy webhook endpoint.
Title Japanized for WooCommerce <= 2.8.4 - Missing Authorization to Unauthenticated Paidy Order Manipulation
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Shoheitanaka Japanized For Woocommerce
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:06:07.194Z

Reserved: 2026-01-21T19:03:56.817Z

Link: CVE-2026-1305

cve-icon Vulnrichment

Updated: 2026-02-27T15:39:23.080Z

cve-icon NVD

Status : Deferred

Published: 2026-02-27T10:16:21.863

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-1305

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T18:15:10Z

Weaknesses