The iPaymu Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authentication in all versions up to, and including, 2.0.2 via the 'check_ipaymu_response' function. This is due to the plugin not validating webhook request authenticity through signature verification or origin checks. This makes it possible for unauthenticated attackers to mark WooCommerce orders as paid by sending crafted POST requests to the webhook endpoint without any payment occurring, as well as enumerate order IDs and obtain valid order keys via GET requests, exposing customer order PII including names, addresses, and purchased products.
Metrics
Affected Vendors & Products
References
History
Thu, 08 Jan 2026 10:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Ipaymu
Ipaymu payment Gateway For Woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Ipaymu
Ipaymu payment Gateway For Woocommerce Wordpress Wordpress wordpress |
Wed, 07 Jan 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 07 Jan 2026 06:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The iPaymu Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authentication in all versions up to, and including, 2.0.2 via the 'check_ipaymu_response' function. This is due to the plugin not validating webhook request authenticity through signature verification or origin checks. This makes it possible for unauthenticated attackers to mark WooCommerce orders as paid by sending crafted POST requests to the webhook endpoint without any payment occurring, as well as enumerate order IDs and obtain valid order keys via GET requests, exposing customer order PII including names, addresses, and purchased products. | |
| Title | iPaymu Payment Gateway for WooCommerce <= 2.0.2 - Missing Authentication to Unauthenticated Payment Bypass and Order Information Disclosure | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2026-01-07T06:36:03.402Z
Updated: 2026-01-07T16:13:46.137Z
Reserved: 2026-01-06T18:32:43.133Z
Link: CVE-2026-0656
Updated: 2026-01-07T14:51:30.248Z
Status : Awaiting Analysis
Published: 2026-01-07T12:17:07.867
Modified: 2026-01-08T18:08:54.147
Link: CVE-2026-0656
No data.