Description
The Visa Acceptance Solutions plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.1.0. This is due to the `express_pay_product_page_pay_for_order()` function logging users in based solely on a user-supplied billing email address during guest checkout for subscription products, without verifying email ownership, requiring a password, or validating a one-time token. This makes it possible for unauthenticated attackers to log in as any existing user, including administrators, by providing the target user's email address in the billing_details parameter, resulting in complete account takeover and site compromise.
Published: 2026-04-15
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass Leading to Account Takeover
Action: Patch Immediately
AI Analysis

Impact

The Visa Acceptance Solutions WordPress plugin contains a flaw that allows an attacker to bypass authentication during guest checkout for subscription products. The express_pay_product_page_pay_for_order() function logs a user in based solely on a supplied billing email address, with no verification of email ownership, password, or one‑time token. An unauthenticated attacker can provide any existing user’s email in the billing_details parameter, causing the system to log the attacker in as that user, including administrators. The result is full account takeover and the potential compromise of the entire site.

Affected Systems

Vendors product affected is Visa Acceptance Solutions, specifically all plugin releases up to and including version 2.1.0. Sites running WordPress with this plugin under those versions are vulnerable.

Risk and Exploitability

The vulnerability has a CVSS score of 9.8, indicating a critical level of risk. EPSS information is not available and the issue is not listed in the CISA KEV catalog. Attackers could exploit the flaw remotely by sending a crafted request to the guest checkout endpoint, with no prior authentication or privileged access required. Because the flaw results in immediate account takeover, the consequences for confidentiality, integrity, and availability are severe and affect the entire WordPress installation.

Generated by OpenCVE AI on April 15, 2026 at 10:25 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Visa Acceptance Solutions to the latest plugin version where the authentication bypass is fixed.
  • If an upgrade cannot be performed immediately, disable the plugin on all vulnerable sites to prevent exploitation.
  • Confirm that the billing email field no longer triggers automatic login and that authentication requires valid credentials or proper token validation.

Generated by OpenCVE AI on April 15, 2026 at 10:25 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 15 Apr 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Wed, 15 Apr 2026 15:15:00 +0000

Type Values Removed Values Added
First Time appeared Visaacceptancesolutions
Visaacceptancesolutions visa Acceptance Solutions
Wordpress
Wordpress wordpress
Vendors & Products Visaacceptancesolutions
Visaacceptancesolutions visa Acceptance Solutions
Wordpress
Wordpress wordpress

Wed, 15 Apr 2026 09:00:00 +0000

Type Values Removed Values Added
Description The Visa Acceptance Solutions plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.1.0. This is due to the `express_pay_product_page_pay_for_order()` function logging users in based solely on a user-supplied billing email address during guest checkout for subscription products, without verifying email ownership, requiring a password, or validating a one-time token. This makes it possible for unauthenticated attackers to log in as any existing user, including administrators, by providing the target user's email address in the billing_details parameter, resulting in complete account takeover and site compromise.
Title Visa Acceptance Solutions <= 2.1.0 - Unauthenticated Authentication Bypass via Billing Email
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Visaacceptancesolutions Visa Acceptance Solutions
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-15T15:50:14.969Z

Reserved: 2026-03-02T22:03:26.688Z

Link: CVE-2026-3461

cve-icon Vulnrichment

Updated: 2026-04-15T15:49:56.141Z

cve-icon NVD

Status : Received

Published: 2026-04-15T09:16:31.383

Modified: 2026-04-15T09:16:31.383

Link: CVE-2026-3461

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-15T14:53:19Z

Weaknesses