5.5
CVSSv2

CVE-2020-8819

Published: 25/02/2020 Updated: 04/03/2020
CVSS v2 Base Score: 5.5 | Impact Score: 4.9 | Exploitability Score: 8
CVSS v3 Base Score: 8.1 | Impact Score: 5.2 | Exploitability Score: 2.8
VMScore: 555
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:N

Vulnerability Summary

An issue exists in the CardGate Payments plugin up to and including 3.1.15 for WooCommerce. Lack of origin authentication in the IPN callback processing function in cardgate/cardgate.php allows an malicious user to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cardgate cardgate payments

Exploits

# Exploit Title: WordPress Plugin WooCommerce CardGate Payment Gateway 3115 - Payment Process Bypass # Discovery Date: 2020-02-02 # Public Disclosure Date: 2020-02-22 # Exploit Author: GeekHack # Vendor Homepage: wwwcardgatecom (wwwcuropaymentscom) # Software Link: githubcom/cardgate/woocommerce/releases/tag/v3115 # Version ...
WordPress WooCommerce CardGate Payment Gateway plugin version 3115 suffers from a payment process bypass vulnerability ...