Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0692: CWE-862 Missing Authorization in bluesnap BlueSnap Payment Gateway for WooCommerce

0
High
VulnerabilityCVE-2026-0692cvecve-2026-0692cwe-862
Published: Sat Feb 14 2026 (02/14/2026, 04:35:43 UTC)
Source: CVE Database V5
Vendor/Project: bluesnap
Product: BlueSnap Payment Gateway for WooCommerce

Description

The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.4.0. This is due to the plugin relying on WooCommerce's `WC_Geolocation::get_ip_address()` function to validate IPN requests, which trusts user-controllable headers like X-Real-IP and X-Forwarded-For to determine the client IP address. This makes it possible for unauthenticated attackers to bypass IP allowlist restrictions by spoofing a whitelisted BlueSnap IP address and send forged IPN (Instant Payment Notification) data to manipulate order statuses (mark orders as paid, failed, refunded, or on-hold) without proper authorization.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 04/09/2026, 11:09:04 UTC

Technical Analysis

CVE-2026-0692 is a missing authorization vulnerability (CWE-862) in the BlueSnap Payment Gateway for WooCommerce plugin for WordPress, affecting all versions up to 3.4.0. The plugin improperly validates IPN requests by relying on WooCommerce's WC_Geolocation::get_ip_address() function, which uses user-controllable HTTP headers to determine client IP addresses. This trust in spoofable headers enables unauthenticated attackers to bypass IP allowlist restrictions by spoofing BlueSnap IP addresses. Consequently, attackers can send forged IPN data to manipulate order statuses without authorization, impacting the integrity of order processing.

Potential Impact

The vulnerability allows unauthenticated attackers to bypass IP allowlist restrictions and send forged IPN messages to the BlueSnap Payment Gateway for WooCommerce plugin. This can lead to unauthorized manipulation of order statuses, including marking orders as paid, failed, refunded, or on-hold. The integrity of order processing is compromised, potentially causing financial discrepancies and operational issues. There is no indication of confidentiality or availability impact. No known exploits in the wild have been reported as of the published date.

Mitigation Recommendations

Patch status is not yet confirmed — check the vendor advisory for current remediation guidance. Since no patch or official fix is documented in the provided information, users should monitor the vendor's communications for updates. As a temporary mitigation, avoid relying solely on IP address validation using user-controllable headers for IPN requests. Implement additional authorization checks or restrict IPN processing to verified sources through more robust methods. Do not trust HTTP headers like X-Real-IP or X-Forwarded-For for security decisions until a fix is available.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2026-01-07T20:56:45.998Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 698ffec8c9e1ff5ad85c71ee

Added to database: 2/14/2026, 4:49:12 AM

Last enriched: 4/9/2026, 11:09:04 AM

Last updated: 5/22/2026, 5:23:44 AM

Views: 137

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses