Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0656: CWE-862 Missing Authorization in ipaymu iPaymu Payment Gateway for WooCommerce

0
High
VulnerabilityCVE-2026-0656cvecve-2026-0656cwe-862
Published: Wed Jan 07 2026 (01/07/2026, 06:36:03 UTC)
Source: CVE Database V5
Vendor/Project: ipaymu
Product: iPaymu Payment Gateway for WooCommerce

Description

The iPaymu Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authentication in all versions up to, and including, 2.0.2 via the 'check_ipaymu_response' function. This is due to the plugin not validating webhook request authenticity through signature verification or origin checks. This makes it possible for unauthenticated attackers to mark WooCommerce orders as paid by sending crafted POST requests to the webhook endpoint without any payment occurring, as well as enumerate order IDs and obtain valid order keys via GET requests, exposing customer order PII including names, addresses, and purchased products.

AI-Powered Analysis

AILast updated: 01/07/2026, 07:06:25 UTC

Technical Analysis

The iPaymu Payment Gateway for WooCommerce plugin suffers from a Missing Authorization vulnerability (CWE-862) identified as CVE-2026-0656. The root cause lies in the 'check_ipaymu_response' function, which processes webhook callbacks from the payment gateway but does not validate the authenticity of incoming requests. Specifically, the plugin lacks signature verification or origin checks, allowing any external party to send POST requests to the webhook endpoint and manipulate order statuses. This enables attackers to mark orders as paid without actual payment, effectively committing fraud. Furthermore, the plugin exposes endpoints that allow enumeration of order IDs and retrieval of valid order keys via GET requests, leading to unauthorized disclosure of personally identifiable information (PII) such as customer names, addresses, and details of purchased products. The vulnerability affects all plugin versions up to 2.0.2. The CVSS v3.1 score of 8.2 reflects the high impact on confidentiality and integrity, with no required privileges or user interaction and network attack vector. Although no public exploits have been reported, the ease of exploitation and the sensitive nature of the data involved make this a critical concern for WooCommerce sites using iPaymu as a payment gateway.

Potential Impact

For European organizations operating WooCommerce stores with the iPaymu Payment Gateway plugin, this vulnerability can lead to significant financial and reputational damage. Attackers can fraudulently mark orders as paid, resulting in loss of revenue and potential inventory mismanagement. The exposure of customer PII violates GDPR requirements, risking regulatory fines and legal consequences. The data leakage of names, addresses, and purchase details can also facilitate targeted phishing or identity theft attacks against customers. The integrity of order processing is compromised, undermining trust in e-commerce operations. Given the network-based exploitation and lack of authentication, attackers can remotely exploit this vulnerability without user interaction, increasing the risk of widespread abuse. The absence of known exploits in the wild does not diminish the urgency, as the vulnerability is straightforward to exploit once discovered.

Mitigation Recommendations

Immediate mitigation steps include disabling the iPaymu Payment Gateway plugin until a patched version is available. If disabling is not feasible, organizations should implement network-level controls such as IP whitelisting to restrict access to the webhook endpoint only to trusted iPaymu IP addresses. Web application firewalls (WAFs) can be configured to detect and block anomalous POST requests to the webhook URL. Monitoring and alerting on unusual order status changes or sudden spikes in marked-as-paid orders can help detect exploitation attempts. Additionally, organizations should audit access logs for suspicious GET requests that enumerate order IDs and keys. Developers should prioritize releasing a patched plugin version that enforces signature verification and origin checks on webhook requests. Until then, encrypting sensitive data at rest and minimizing stored PII can reduce exposure. Finally, informing customers about potential data exposure and reinforcing security awareness can mitigate downstream risks.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-06T18:32:43.133Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 695e0294a55ed4ed9984d573

Added to database: 1/7/2026, 6:52:04 AM

Last enriched: 1/7/2026, 7:06:25 AM

Last updated: 1/8/2026, 10:51:07 AM

Views: 18

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats