Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-8819 |
CWE-ID | CWE-346 |
Exploitation vector | Network |
Public exploit | Public exploit code for vulnerability #1 is available. |
Vulnerable software Subscribe |
CardGate Payments for WooCommerce Web applications / Modules and components for CMS |
Vendor | CardGate |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU25673
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2020-8819
CWE-ID:
CWE-346 - Origin Validation Error
Exploit availability: Yes
DescriptionThe vulnerability allows a remote attacker to compromise the target system.
The vulnerability exists due to a lack of origin authentication at IPN callback processing function. A remote attacker can replace critical plugin settings (merchant id, secret key etc) with known to him and therefore bypass payment process (eg. spoof order status by manually sending IPN callback request with a valid signature but without real payment) and/or receive all subsequent payments (on behalf of the store).Install updates from vendor's website.
Vulnerable software versionsCardGate Payments for WooCommerce: 3.0.4 - 3.1.15
CPE2.3 External linkshttp://packetstormsecurity.com/files/156504/WordPress-WooCommerce-CardGate-Payment-Gateway-3.1.15-Bypass.html
http://github.com/cardgate/woocommerce/blob/f2111af7b1a3fd701c1c5916137f3ac09482feeb/cardgate/cardgate.php#L426-L442
http://github.com/cardgate/woocommerce/issues/18
http://wpvulndb.com/vulnerabilities/10097
http://www.exploit-db.com/exploits/48134
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?