First published: Tue Feb 25 2020(Updated: )
An issue was discovered in the CardGate Payments plugin through 3.1.15 for WooCommerce. Lack of origin authentication in the IPN callback processing function in cardgate/cardgate.php allows an attacker to remotely replace critical plugin settings (merchant ID, secret key, etc.) and therefore bypass the payment process (e.g., spoof an order status by manually sending an IPN callback request with a valid signature but without real payment) and/or receive all of the subsequent payments.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
CardGate CardGate Payments WooCommerce | <=3.1.15 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2020-8819.
The affected software is the CardGate Payments plugin through version 3.1.15 for WooCommerce.
The severity of CVE-2020-8819 is high with a CVSS score of 8.1.
CVE-2020-8819 is classified under CWE-346.
An attacker can exploit CVE-2020-8819 by remotely replacing critical plugin settings (merchant ID, secret key, etc.) in the IPN callback processing function.