The Otter Blocks plugin for WordPress is vulnerable to Purchase Verification Bypass in all versions up to, and including, 3.1.4. This is due to the 'get_customer_data' method relying on an unsigned 'o_stripe_data' cookie to determine Stripe product ownership for unauthenticated users. The 'check_purchase' method trusts this cookie data without performing server-side verification against the Stripe API for one-time 'payment' mode purchases. This makes it possible for unauthenticated attackers to bypass Stripe purchase-gated content visibility conditions by forging the 'o_stripe_data' cookie with a target product ID, which is publicly exposed in the checkout block's HTML source.
History

Fri, 01 May 2026 17:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 08:45:00 +0000

Type Values Removed Values Added
First Time appeared Themeisle
Themeisle otter Blocks – Gutenberg Blocks, Page Builder For Gutenberg Editor & Fse
Wordpress
Wordpress wordpress
Vendors & Products Themeisle
Themeisle otter Blocks – Gutenberg Blocks, Page Builder For Gutenberg Editor & Fse
Wordpress
Wordpress wordpress

Thu, 30 Apr 2026 14:15:00 +0000

Type Values Removed Values Added
Description The Otter Blocks plugin for WordPress is vulnerable to Purchase Verification Bypass in all versions up to, and including, 3.1.4. This is due to the 'get_customer_data' method relying on an unsigned 'o_stripe_data' cookie to determine Stripe product ownership for unauthenticated users. The 'check_purchase' method trusts this cookie data without performing server-side verification against the Stripe API for one-time 'payment' mode purchases. This makes it possible for unauthenticated attackers to bypass Stripe purchase-gated content visibility conditions by forging the 'o_stripe_data' cookie with a target product ID, which is publicly exposed in the checkout block's HTML source.
Title Otter Blocks <= 3.1.4 - Improper Authorization to Unauthenticated Purchase Verification Bypass via Forged Cookie
Weaknesses CWE-285
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2026-04-30T13:28:21.322Z

Updated: 2026-05-01T16:38:40.570Z

Reserved: 2026-02-20T18:15:09.231Z

Link: CVE-2026-2892

cve-icon Vulnrichment

Updated: 2026-05-01T16:38:35.368Z

cve-icon NVD

Status : Deferred

Published: 2026-04-30T14:16:29.760

Modified: 2026-04-30T14:52:54.847

Link: CVE-2026-2892

cve-icon Redhat

No data.