{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-26T06:09:37.582","vulnerabilities":[{"cve":{"id":"CVE-2026-0692","sourceIdentifier":"security@wordfence.com","published":"2026-02-14T05:16:16.923","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.4.0. This is due to the plugin relying on WooCommerce's `WC_Geolocation::get_ip_address()` function to validate IPN requests, which trusts user-controllable headers like X-Real-IP and X-Forwarded-For to determine the client IP address. This makes it possible for unauthenticated attackers to bypass IP allowlist restrictions by spoofing a whitelisted BlueSnap IP address and send forged IPN (Instant Payment Notification) data to manipulate order statuses (mark orders as paid, failed, refunded, or on-hold) without proper authorization."},{"lang":"es","value":"El plugin BlueSnap Payment Gateway para WooCommerce para WordPress es vulnerable a la Falta de autorización en todas las versiones hasta la 3.3.0, inclusive. Esto se debe a que el plugin se basa en la función 'WC_Geolocation::get_ip_address()' de WooCommerce para validar las solicitudes IPN, la cual confía en encabezados controlables por el usuario como X-Real-IP y X-Forwarded-For para determinar la dirección IP del cliente. Esto hace posible que atacantes no autenticados eludan las restricciones de la lista de permitidos de IP suplantando una dirección IP de BlueSnap en la lista blanca y envíen datos IPN (Notificación de Pago Instantánea) falsificados para manipular estados de pedidos (marcar pedidos como pagados, fallidos, reembolsados o en espera) sin la autorización adecuada."}],"metrics":{"cvssMetricV31":[{"source":"security@wordfence.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"security@wordfence.com","type":"Secondary","description":[{"lang":"en","value":"CWE-862"}]}],"references":[{"url":"https://plugins.trac.wordpress.org/browser/bluesnap-payment-gateway-for-woocommerce/tags/3.4.0/includes/class-wc-bluesnap-ipn-webhooks.php#L417","source":"security@wordfence.com"},{"url":"https://plugins.trac.wordpress.org/browser/bluesnap-payment-gateway-for-woocommerce/trunk/includes/class-wc-bluesnap-ipn-webhooks.php#L417","source":"security@wordfence.com"},{"url":"https://www.wordfence.com/threat-intel/vulnerabilities/id/dc676e18-c895-4f6a-bce9-1f92207af885?source=cve","source":"security@wordfence.com"}]}}]}