The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' failing to validate that the authority token provided in the callback URL belongs to the specific order being marked as paid. This makes it possible for unauthenticated attackers to potentially mark orders as paid without proper payment by reusing a valid authority token from a different transaction of the same amount.
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Tue, 17 Feb 2026 09:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wordpress
Wordpress wordpress Zarinpal Zarinpal zarinpal Gateway |
|
| Vendors & Products |
Wordpress
Wordpress wordpress Zarinpal Zarinpal zarinpal Gateway |
Tue, 17 Feb 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' failing to validate that the authority token provided in the callback URL belongs to the specific order being marked as paid. This makes it possible for unauthenticated attackers to potentially mark orders as paid without proper payment by reusing a valid authority token from a different transaction of the same amount. | |
| Title | Zarinpal Gateway for WooCommerce <= 5.0.16 - Improper Access Control to Payment Status Update | |
| Weaknesses | CWE-284 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-02-17T04:35:45.952Z
Reserved: 2026-02-16T16:34:33.188Z
Link: CVE-2026-2592
No data.
Status : Received
Published: 2026-02-17T05:16:17.430
Modified: 2026-02-17T05:16:17.430
Link: CVE-2026-2592
No data.
OpenCVE Enrichment
Updated: 2026-02-17T08:48:53Z
Weaknesses