Description
The iPOSpays Gateways WC plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 1.3.7. This is due to the plugin exposing a REST API endpoint /wp-json/ipospays/v1/save_settings with 'permission_callback' set to '__return_true', which allows unauthenticated access without any capability checks or nonce verification. This makes it possible for unauthenticated attackers to update plugin settings, specifically allowing them to overwrite critical payment gateway settings including live API keys, secret keys, and payment tokens stored in the 'woocommerce_ipospays_settings' option.
Published: 2026-05-12
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The iPOSpays Gateways WC plugin for WordPress contains a REST API endpoint /wp-json/ipospays/v1/save_settings that is configured with a permission callback returning true, effectively exposing the endpoint to all callers without any authorization checks or nonce verification. This flaw allows an unauthenticated actor to modify the entire settings object of the plugin, overwriting critical values such as live API keys, secret keys, and payment tokens stored in the woocommerce_ipospays_settings option. With these values under attacker control, the compromised site could route legitimate payment traffic through malicious endpoints, siphon funds, or inject fraudulent charges.

Affected Systems

WordPress sites using the iPOSpays Gateways WC plugin version 1.3.7 or older are impacted. The vulnerability is present in all releases up to and including 1.3.7 of the plugin, and it directly affects the payment gateway settings stored by the plugin. No specific WordPress core or other plugins are required to be vulnerable other than the presence of the affected plugin.

Risk and Exploitability

The CVSS base score of 5.3 indicates a moderate severity for this missing authorization issue. Because the REST endpoint is openly accessible without authentication or nonce protection, an attacker only needs to send a simple HTTP request to the endpoint; no additional privileges are required. The EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog, but the absence of authentication makes exploitation straightforward for anyone with network access to the site.

Generated by OpenCVE AI on May 12, 2026 at 10:28 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the iPOSpays Gateways WC plugin to a version that removes the unauthenticated REST endpoint or adds proper permission checks.
  • If an update is not immediately possible, disable or remove the /wp-json/ipospays/v1/save_settings route by modifying the plugin code or adding a custom filter that blocks the route for unauthenticated requests.
  • After applying the fix, audit the woocommerce_ipospays_settings option to ensure no unauthorized or malicious payment gateway configuration values remain.

Generated by OpenCVE AI on May 12, 2026 at 10:28 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 12 May 2026 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 12 May 2026 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Ipospays
Ipospays ipospays Gateways Wc
Wordpress
Wordpress wordpress
Vendors & Products Ipospays
Ipospays ipospays Gateways Wc
Wordpress
Wordpress wordpress

Tue, 12 May 2026 08:30:00 +0000

Type Values Removed Values Added
Description The iPOSpays Gateways WC plugin for WordPress is vulnerable to Missing Authorization in versions up to and including 1.3.7. This is due to the plugin exposing a REST API endpoint /wp-json/ipospays/v1/save_settings with 'permission_callback' set to '__return_true', which allows unauthenticated access without any capability checks or nonce verification. This makes it possible for unauthenticated attackers to update plugin settings, specifically allowing them to overwrite critical payment gateway settings including live API keys, secret keys, and payment tokens stored in the 'woocommerce_ipospays_settings' option.
Title iPOSpays Gateways WC <= 1.3.7 - Unauthenticated Missing Authorization to Settings Update via REST API Endpoint
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Ipospays Ipospays Gateways Wc
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-12T21:13:41.458Z

Reserved: 2026-03-23T16:19:41.095Z

Link: CVE-2026-4663

cve-icon Vulnrichment

Updated: 2026-05-12T21:13:34.921Z

cve-icon NVD

Status : Deferred

Published: 2026-05-12T09:16:41.900

Modified: 2026-05-12T14:03:52.757

Link: CVE-2026-4663

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-12T11:45:14Z

Weaknesses