The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.3.0. This is due to the plugin relying on WooCommerce's `WC_Geolocation::get_ip_address()` function to validate IPN requests, which trusts user-controllable headers like X-Real-IP and X-Forwarded-For to determine the client IP address. This makes it possible for unauthenticated attackers to bypass IP allowlist restrictions by spoofing a whitelisted BlueSnap IP address and send forged IPN (Instant Payment Notification) data to manipulate order statuses (mark orders as paid, failed, refunded, or on-hold) without proper authorization.
Metrics
Affected Vendors & Products
References
History
Mon, 16 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Hblpay
Hblpay payment Gateway For Woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Hblpay
Hblpay payment Gateway For Woocommerce Wordpress Wordpress wordpress |
Sat, 14 Feb 2026 04:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.3.0. This is due to the plugin relying on WooCommerce's `WC_Geolocation::get_ip_address()` function to validate IPN requests, which trusts user-controllable headers like X-Real-IP and X-Forwarded-For to determine the client IP address. This makes it possible for unauthenticated attackers to bypass IP allowlist restrictions by spoofing a whitelisted BlueSnap IP address and send forged IPN (Instant Payment Notification) data to manipulate order statuses (mark orders as paid, failed, refunded, or on-hold) without proper authorization. | |
| Title | BlueSnap Payment Gateway for WooCommerce <= 3.3.0 - Missing Authorization to Unauthenticated Arbitrary Order Status Manipulation | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published: 2026-02-14T04:35:43.208Z
Updated: 2026-02-14T04:35:43.208Z
Reserved: 2026-01-07T20:56:45.998Z
Link: CVE-2026-0692
No data.
Status : Received
Published: 2026-02-14T05:16:16.923
Modified: 2026-02-14T05:16:16.923
Link: CVE-2026-0692
No data.