Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0692: CWE-862 Missing Authorization in bluesnap BlueSnap Payment Gateway for WooCommerce

0
High
VulnerabilityCVE-2026-0692cvecve-2026-0692cwe-862
Published: Sat Feb 14 2026 (02/14/2026, 04:35:43 UTC)
Source: CVE Database V5
Vendor/Project: bluesnap
Product: BlueSnap Payment Gateway for WooCommerce

Description

The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.3.0. This is due to the plugin relying on WooCommerce's `WC_Geolocation::get_ip_address()` function to validate IPN requests, which trusts user-controllable headers like X-Real-IP and X-Forwarded-For to determine the client IP address. This makes it possible for unauthenticated attackers to bypass IP allowlist restrictions by spoofing a whitelisted BlueSnap IP address and send forged IPN (Instant Payment Notification) data to manipulate order statuses (mark orders as paid, failed, refunded, or on-hold) without proper authorization.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/21/2026, 22:06:50 UTC

Technical Analysis

CVE-2026-0692 is a Missing Authorization vulnerability (CWE-862) found in the BlueSnap Payment Gateway plugin for WooCommerce, affecting all versions up to 3.3.0. The root cause lies in the plugin's reliance on WooCommerce's WC_Geolocation::get_ip_address() function to validate IPN requests. This function determines the client IP address by trusting HTTP headers such as X-Real-IP and X-Forwarded-For, which can be manipulated by attackers. Because the plugin uses this IP address to enforce an IP allowlist for incoming IPN requests, an attacker can spoof a whitelisted BlueSnap IP address by crafting requests with forged headers. This allows unauthenticated attackers to bypass IP-based restrictions and send fraudulent IPN messages to the WooCommerce store. These forged IPN messages can alter order statuses arbitrarily—marking orders as paid, failed, refunded, or on-hold—thereby compromising the integrity of transaction processing. The vulnerability does not impact confidentiality or availability directly but severely impacts integrity. The CVSS 3.1 base score is 7.5 (high), reflecting the network attack vector, low attack complexity, no privileges required, no user interaction, and a scope limited to the vulnerable plugin. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date. The vulnerability highlights the risk of trusting user-controllable headers for security-critical decisions and the need for robust IPN validation mechanisms that do not rely solely on IP address checks.

Potential Impact

This vulnerability allows attackers to manipulate order statuses in WooCommerce stores using the BlueSnap Payment Gateway plugin without authentication. The primary impact is on the integrity of e-commerce transactions, enabling fraudulent activities such as marking unpaid orders as paid, triggering refunds, or canceling legitimate orders. This can lead to financial losses, inventory mismanagement, and reputational damage for affected merchants. Additionally, attackers could disrupt business operations by causing confusion in order fulfillment processes. Since the vulnerability can be exploited remotely over the network without user interaction or credentials, the attack surface is broad. Organizations relying on this payment gateway are at risk of fraudulent transactions and potential chargebacks. The lack of confidentiality or availability impact means data leakage or denial of service is not a direct concern, but the financial and operational consequences are significant. The vulnerability undermines trust in the payment processing system and could be leveraged as part of larger fraud schemes.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately implement stricter validation of IPN requests beyond relying on IP address checks derived from user-controllable headers. Specifically, they should: 1) Avoid trusting HTTP headers like X-Real-IP and X-Forwarded-For for security decisions, as these can be spoofed. 2) Implement cryptographic verification of IPN messages, such as validating digital signatures or shared secrets provided by BlueSnap to authenticate requests. 3) Restrict IPN endpoints to accept requests only from verified BlueSnap IP addresses at the network firewall level, ensuring that spoofed headers cannot bypass these controls. 4) Monitor and log IPN requests for anomalies, including unexpected order status changes or IP addresses. 5) Update the BlueSnap Payment Gateway plugin to a patched version once available or apply vendor-recommended fixes. 6) Consider deploying Web Application Firewalls (WAFs) with rules to detect and block spoofed IP header attempts. 7) Educate development and security teams about the risks of trusting user-controllable headers and enforce secure coding practices. These measures collectively reduce the risk of unauthorized order manipulation and protect the integrity of payment processing.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-07T20:56:45.998Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698ffec8c9e1ff5ad85c71ee

Added to database: 2/14/2026, 4:49:12 AM

Last enriched: 2/21/2026, 10:06:50 PM

Last updated: 4/6/2026, 4:10:38 PM

Views: 81

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses