The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.3.0. This is due to the plugin relying on WooCommerce's `WC_Geolocation::get_ip_address()` function to validate IPN requests, which trusts user-controllable headers like X-Real-IP and X-Forwarded-For to determine the client IP address. This makes it possible for unauthenticated attackers to bypass IP allowlist restrictions by spoofing a whitelisted BlueSnap IP address and send forged IPN (Instant Payment Notification) data to manipulate order statuses (mark orders as paid, failed, refunded, or on-hold) without proper authorization.
History

Mon, 16 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
First Time appeared Hblpay
Hblpay payment Gateway For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Hblpay
Hblpay payment Gateway For Woocommerce
Wordpress
Wordpress wordpress

Sat, 14 Feb 2026 04:45:00 +0000

Type Values Removed Values Added
Description The BlueSnap Payment Gateway for WooCommerce plugin for WordPress is vulnerable to Missing Authorization in all versions up to, and including, 3.3.0. This is due to the plugin relying on WooCommerce's `WC_Geolocation::get_ip_address()` function to validate IPN requests, which trusts user-controllable headers like X-Real-IP and X-Forwarded-For to determine the client IP address. This makes it possible for unauthenticated attackers to bypass IP allowlist restrictions by spoofing a whitelisted BlueSnap IP address and send forged IPN (Instant Payment Notification) data to manipulate order statuses (mark orders as paid, failed, refunded, or on-hold) without proper authorization.
Title BlueSnap Payment Gateway for WooCommerce <= 3.3.0 - Missing Authorization to Unauthenticated Arbitrary Order Status Manipulation
Weaknesses CWE-862
References
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published: 2026-02-14T04:35:43.208Z

Updated: 2026-02-14T04:35:43.208Z

Reserved: 2026-01-07T20:56:45.998Z

Link: CVE-2026-0692

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-02-14T05:16:16.923

Modified: 2026-02-14T05:16:16.923

Link: CVE-2026-0692

cve-icon Redhat

No data.