The Authorize.net Payment Gateway For WooCommerce plugin for WordPress is vulnerable to payment bypass in all versions up to, and including, 8.0. This is due to the plugin not properly verifying the authenticity of the request that updates a orders payment status. This makes it possible for unauthenticated attackers to update order payment statuses to paid bypassing any payment.
References
Configurations
No configuration.
History
08 Apr 2026, 18:21
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-345 |
21 Nov 2024, 09:09
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://plugins.trac.wordpress.org/browser/authorizenet-payment-gateway-for-woocommerce/trunk/index.php#L205 - | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/4ab71d24-0409-421b-8abf-f4d5390a32a1?source=cve - |
04 Jun 2024, 16:57
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
04 Jun 2024, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-06-04 06:15
Updated : 2026-04-15 00:35
NVD link : CVE-2024-2382
Mitre link : CVE-2024-2382
CVE.ORG link : CVE-2024-2382
JSON object : View
Products Affected
No product.
CWE
CWE-345
Insufficient Verification of Data Authenticity
