CVE-2026-0656
iPaymu · iPaymu Payment Gateway for WooCommerce plugin for WordPress
A high-severity vulnerability has been identified in the iPaymu Payment Gateway for WooCommerce plugin for WordPress.
Executive summary
A high-severity vulnerability has been identified in the iPaymu Payment Gateway for WooCommerce plugin for WordPress. This flaw, resulting from missing authentication on critical functions, allows an unauthenticated attacker to potentially manipulate payment data or access sensitive information. Successful exploitation could lead to direct financial loss, reputational damage, and compromise of customer payment details.
Vulnerability
The vulnerability exists because certain functions within the plugin do not properly check if a user is authenticated before processing actions. An unauthenticated remote attacker can exploit this by sending a specially crafted HTTP request directly to a vulnerable endpoint within the plugin. This could allow the attacker to access administrative functions, view or modify transaction statuses, or alter plugin settings without providing any valid credentials.
Business impact
This vulnerability is rated as High severity with a CVSS score of 8.2. Exploitation could have a significant negative impact on the business, leading to direct financial losses through fraudulent transactions, unauthorized refunds, or payment diversions. Furthermore, the potential exposure of customer payment information could result in severe reputational damage, loss of customer trust, and non-compliance with data protection regulations such as PCI DSS, potentially leading to fines and legal action.
Remediation
Immediate Action:
- Immediately update the iPaymu Payment Gateway for WooCommerce plugin to the latest version provided by the vendor, which addresses this vulnerability.
- If the plugin is not essential for business operations, consider disabling and removing it entirely to eliminate the attack surface.
- Review all WordPress security settings and user permissions to ensure adherence to the principle of least privilege.
Proactive Monitoring:
- Monitor web server access logs for unusual or direct requests to the plugin's directories and files (e.g.,
wp-content/plugins/ipaymu-payment-gateway-for-woocommerce/). - Review payment gateway logs and financial transaction records for any anomalies, such as transactions with mismatched statuses or unauthorized changes.
- Implement file integrity monitoring to detect unauthorized changes to plugin files.
Compensating Controls:
- If immediate patching is not feasible, implement a Web Application Firewall (WAF) rule to block or restrict access to the specific vulnerable endpoints of the plugin.
- Restrict access to the WordPress administrative dashboard (
/wp-admin/) to trusted IP addresses only. - Regularly back up the website and database to facilitate recovery in case of a compromise.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Given the high CVSS score of 8.2 and the critical nature of the affected component (a payment gateway), this vulnerability poses a significant and immediate risk. We strongly recommend that all organizations using the affected plugin apply the vendor-supplied patch immediately. Although this vulnerability is not currently listed on the CISA KEV list, its potential for direct financial impact makes it a top priority for remediation.