Description
The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' failing to validate that the authority token provided in the callback URL belongs to the specific order being marked as paid. This makes it possible for unauthenticated attackers to potentially mark orders as paid without proper payment by reusing a valid authority token from a different transaction of the same amount.
Published: 2026-02-17
Score: 7.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Unauthorized order status manipulation possible
Action: Immediate Patch
AI Analysis

Impact

The Zarinpal Gateway for WooCommerce plugin allows an attacker to change an order’s status to paid without completing a legitimate transaction by reusing an authority token that belongs to a different order. This flaw is caused by the callback handler not verifying that the token supplied matches the order in question. The result is that fraudulent orders could be marked as paid, leading to financial loss and trust erosion.

Affected Systems

All installations of the Zarinpal Gateway for WooCommerce WordPress plugin up to and including version 5.0.16 are affected. Sites running those versions should consider themselves vulnerable.

Risk and Exploitability

The vulnerability has a CVSS score of 7.7 and an EPSS of less than 1 %, indicating that while the flaw is technically significant, exploitation may be rare. Because it relies on the payment callback URL and a valid authority token, an attacker can trigger it remotely by crafting a request that includes a token from another transaction of the same amount. The flaw is not listed in CISA’s KEV catalog, but the potential for unauthorized payment status changes warrants immediate remediation.

Generated by OpenCVE AI on April 15, 2026 at 17:09 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Zarinpal Gateway for WooCommerce plugin to a version newer than 5.0.16.
  • Configure the payment callback handler to validate that the authority token matches the specific order before marking it as paid.
  • Implement monitoring of order status changes for anomalies and configure alerts for suspicious paid orders.

Generated by OpenCVE AI on April 15, 2026 at 17:09 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 17 Feb 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Zarinpal
Zarinpal zarinpal Gateway
Vendors & Products Wordpress
Wordpress wordpress
Zarinpal
Zarinpal zarinpal Gateway

Tue, 17 Feb 2026 05:15:00 +0000

Type Values Removed Values Added
Description The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' failing to validate that the authority token provided in the callback URL belongs to the specific order being marked as paid. This makes it possible for unauthenticated attackers to potentially mark orders as paid without proper payment by reusing a valid authority token from a different transaction of the same amount.
Title Zarinpal Gateway for WooCommerce <= 5.0.16 - Improper Access Control to Payment Status Update
Weaknesses CWE-284
References
Metrics cvssV3_1

{'score': 7.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H'}


Subscriptions

Wordpress Wordpress
Zarinpal Zarinpal Gateway
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:29:22.353Z

Reserved: 2026-02-16T16:34:33.188Z

Link: CVE-2026-2592

cve-icon Vulnrichment

Updated: 2026-02-17T15:06:14.400Z

cve-icon NVD

Status : Deferred

Published: 2026-02-17T05:16:17.430

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-2592

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T17:30:10Z

Weaknesses