The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' failing to validate that the authority token provided in the callback URL belongs to the specific order being marked as paid. This makes it possible for unauthenticated attackers to potentially mark orders as paid without proper payment by reusing a valid authority token from a different transaction of the same amount.
Metrics
Affected Vendors & Products
References
History
Tue, 17 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 17 Feb 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Zarinpal Zarinpal zarinpal Gateway |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Zarinpal Zarinpal zarinpal Gateway |
Tue, 17 Feb 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' failing to validate that the authority token provided in the callback URL belongs to the specific order being marked as paid. This makes it possible for unauthenticated attackers to potentially mark orders as paid without proper payment by reusing a valid authority token from a different transaction of the same amount. | |
| Title | Zarinpal Gateway for WooCommerce <= 5.0.16 - Improper Access Control to Payment Status Update | |
| Weaknesses | CWE-284 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2026-02-17T04:35:45.952Z
Updated: 2026-02-17T15:06:18.488Z
Reserved: 2026-02-16T16:34:33.188Z
Link: CVE-2026-2592
Updated: 2026-02-17T15:06:14.400Z
Status : Received
Published: 2026-02-17T05:16:17.430
Modified: 2026-02-17T05:16:17.430
Link: CVE-2026-2592
No data.