Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0692: CWE-862 Missing Authorization in bluesnap BlueSnap Payment Gateway for WooCommerce

0
High
VulnerabilityCVE-2026-0692cvecve-2026-0692cwe-862
Published: Sat Feb 14 2026 (02/14/2026, 04:35:43 UTC)
Source: CVE Database V5
Vendor/Project: bluesnap
Product: BlueSnap Payment Gateway for WooCommerce

Description

The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.3.0. This is due to the plugin relying on WooCommerce's `WC_Geolocation::get_ip_address()` function to validate IPN requests, which trusts user-controllable headers like X-Real-IP and X-Forwarded-For to determine the client IP address. This makes it possible for unauthenticated attackers to bypass IP allowlist restrictions by spoofing a whitelisted BlueSnap IP address and send forged IPN (Instant Payment Notification) data to manipulate order statuses (mark orders as paid, failed, refunded, or on-hold) without proper authorization.

AI-Powered Analysis

AILast updated: 02/14/2026, 05:03:41 UTC

Technical Analysis

CVE-2026-0692 is a Missing Authorization vulnerability (CWE-862) found in the BlueSnap Payment Gateway plugin for WooCommerce, a popular WordPress e-commerce extension. The vulnerability stems from the plugin's reliance on WooCommerce's WC_Geolocation::get_ip_address() function to validate incoming IPN requests. This function determines the client IP address by trusting HTTP headers such as X-Real-IP and X-Forwarded-For, which can be manipulated by an attacker. Because the plugin uses this IP address to enforce an IP allowlist for BlueSnap's servers, an attacker can spoof these headers to impersonate a trusted BlueSnap IP. This allows the attacker to bypass IP-based restrictions and send forged IPN messages to the WooCommerce store. These forged messages can alter order statuses arbitrarily, including marking unpaid orders as paid or triggering refunds and holds, without any authentication or user interaction. The vulnerability affects all versions up to and including 3.3.0 of the plugin. The CVSS 3.1 base score is 7.5 (high), reflecting network attack vector, low attack complexity, no privileges required, no user interaction, and a significant impact on integrity but no impact on confidentiality or availability. No patches are currently linked, and no known exploits have been reported in the wild as of the publication date. The root cause is a flawed trust model in IP address validation and missing authorization checks on IPN message processing.

Potential Impact

For European organizations, especially e-commerce businesses using WooCommerce with the BlueSnap Payment Gateway, this vulnerability poses a significant risk to transaction integrity. Attackers can manipulate order statuses, potentially causing financial losses through fraudulent order confirmations or unauthorized refunds. This undermines trust in online payment processing and can disrupt business operations by creating accounting discrepancies and customer disputes. Since the vulnerability does not require authentication or user interaction, it can be exploited remotely at scale. The impact is particularly critical for high-volume retailers and marketplaces relying on automated payment notifications for order fulfillment. Additionally, regulatory compliance risks may arise if fraudulent transactions lead to data inaccuracies or financial misreporting under GDPR and other European financial regulations. The lack of confidentiality impact limits exposure of sensitive data, but the integrity breach alone can cause severe operational and reputational damage.

Mitigation Recommendations

Immediate mitigation steps include implementing server-side validation that does not rely on client-controllable HTTP headers for IP address determination. Specifically, organizations should configure their web servers or application firewalls to verify the source IP of IPN requests against the official BlueSnap IP ranges without trusting X-Forwarded-For or X-Real-IP headers. Until an official patch is released, disabling the BlueSnap IPN functionality or switching to alternative payment gateways may be necessary for high-risk environments. Monitoring order status changes for anomalies and setting up alerts for unexpected status transitions can help detect exploitation attempts. Organizations should also review and harden their WooCommerce and WordPress configurations, ensuring minimal plugin permissions and up-to-date software. Once available, promptly applying vendor patches or updates addressing this vulnerability is critical. Engaging with BlueSnap support for guidance and updates is recommended. Finally, educating staff about potential fraud indicators related to order processing can aid in early detection.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-07T20:56:45.998Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698ffec8c9e1ff5ad85c71ee

Added to database: 2/14/2026, 4:49:12 AM

Last enriched: 2/14/2026, 5:03:41 AM

Last updated: 2/21/2026, 12:16:35 AM

Views: 41

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats