CVE-2026-2592 PUBLISHED

Zarinpal Gateway for WooCommerce <= 5.0.16 - Improper Access Control to Payment Status Update

Assigner: Wordfence
Reserved: 16.02.2026 Published: 17.02.2026 Updated: 17.02.2026

The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' failing to validate that the authority token provided in the callback URL belongs to the specific order being marked as paid. This makes it possible for unauthenticated attackers to potentially mark orders as paid without proper payment by reusing a valid authority token from a different transaction of the same amount.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H
CVSS Score: 7.7

Product Status

Vendor zarinpal
Product Zarinpal Gateway
Versions Default: unaffected
  • affected from * to 5.0.16 (incl.)

Credits

  • Angus Girvan finder

References

Problem Types

  • CWE-284 Improper Access Control CWE