The WooCommerce Clover Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the callback_handler function in all versions up to, and including, 1.3.1. This makes it possible for unauthenticated attackers to mark orders as paid.
References
Configurations
No configuration.
History
08 Apr 2026, 18:18
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-284 |
21 Nov 2024, 08:47
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://plugins.trac.wordpress.org/browser/woo-clover-gateway-by-zaytech/trunk/zaytech-woo-commerce-clover-integration.php?rev=2998654#L218 - | |
| References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3055678%40woo-clover-gateway-by-zaytech%2Ftrunk&old=2998658%40woo-clover-gateway-by-zaytech%2Ftrunk&sfp_email=&sfph_mail=#file3 - | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/57aacffa-0f49-4a33-ae40-d1c151363284?source=cve - |
09 Apr 2024, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-04-09 19:15
Updated : 2026-04-15 00:35
NVD link : CVE-2024-0626
Mitre link : CVE-2024-0626
CVE.ORG link : CVE-2024-0626
JSON object : View
Products Affected
No product.
CWE
CWE-284
Improper Access Control
