High (7.7)

Wordpress RCE (CVE-2026-2592)

CVE-2026-2592

The Zarinpal Gateway for WooCommerce plugin for WordPress is vulnerable to Improper Access Control to Payment Status Update in all versions up to and including 5.0.16. This is due to the payment callb...

Affected: WordPress

Overview

A critical security flaw has been identified in the Zarinpal Gateway for WooCommerce plugin for WordPress. This vulnerability allows an attacker to fraudulently mark customer orders as “paid” without any actual payment being processed, directly compromising the integrity of your online store’s transactions.

Vulnerability Explained

In simple terms, the plugin’s payment confirmation system is broken. When a customer returns from the Zarinpal payment gateway, the plugin receives a unique transaction token (called an “authority”). The flaw is that the plugin does not correctly verify that this token is uniquely tied to a specific order in your store.

An attacker can exploit this by taking a valid payment token from a different completed transaction (for the same monetary amount) and applying it to an unpaid order. The plugin will then incorrectly mark that new order as paid, even though no money has been received.

Potential Impact

The impact of this vulnerability is severe and direct:

  • Financial Loss: Your store will ship products or provide services without receiving payment.
  • Inventory Discrepancy: Your stock levels will be inaccurate, leading to operational issues.
  • Loss of Trust: Customers who legitimately pay for items may find them out of stock due to fraudulent “sales.”
  • Reputational Damage: Your business could be seen as having an insecure checkout process.

Remediation and Mitigation

Immediate action is required to secure your WooCommerce store.

Primary Solution: Update the Plugin The most important step is to update the Zarinpal Gateway plugin to a patched version immediately. If version 5.0.17 or higher is available, install it. Always update plugins from the official WordPress Plugin Directory or your trusted source.

Immediate Mitigation (If Update is Not Yet Available):

  1. Temporarily Disable the Plugin: If a fix is not immediately available, consider temporarily disabling the Zarinpal payment method and using an alternative, secure gateway until an update is released.
  2. Monitor Orders Closely: Manually review and verify all orders marked as paid via Zarinpal, especially for high-value or high-volume items, until the patch is applied. Look for discrepancies in transaction IDs or customer details.
  3. Check Transaction Logs: Review your Zarinpal merchant panel and WooCommerce order logs for suspicious activity, such as the same authority token appearing on multiple orders.

General Best Practice: Ensure you have a regular schedule for updating all WordPress plugins, themes, and the core itself. Consider using a website firewall (WAF) service that can help block exploit attempts on known vulnerabilities.

Share:

Never miss a critical vulnerability

Get real-time security alerts delivered to your preferred platform.

Related Advisories

Other WordPress Vulnerabilities

View all WordPress vulnerabilities →

Never Miss a Critical Alert

CVE advisories, breach reports, and threat intel — delivered daily to your inbox.