Home Embedded Vulns General Vulns

CVE-2026-2592

HIGH 7.7

Our Analysis: gpsv

Our model has classified this vulnerability as relevant to gpsv Systems, helping your team prioritize efforts effectively.

Published Date February 17, 2026
Last Modified February 17, 2026
CVSS Vector CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:H

Description

The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callback handler 'Return_from_ZarinPal_Gateway' failing to validate that the authority token provided in the callback URL belongs to the specific order being marked as paid. This makes it possible for unauthenticated attackers to potentially mark orders as paid without proper payment by reusing a valid authority token from a different transaction of the same amount.

Potentially Affected Vendors