The Authorize.net Payment Gateway For WooCommerce plugin for WordPress is vulnerable to payment bypass in all versions up to, and including, 8.0. This is due to the plugin not properly verifying the authenticity of the request that updates a orders payment status. This makes it possible for unauthenticated attackers to update order payment statuses to paid bypassing any payment.
History

Wed, 08 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Weaknesses CWE-345

Fri, 27 Feb 2026 01:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sun, 13 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00363}

epss

{'score': 0.00191}


Sat, 12 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.00344}

epss

{'score': 0.00363}


cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:50:47.143Z

Reserved: 2024-03-11T16:08:11.972Z

Link: CVE-2024-2382

cve-icon Vulnrichment

Updated: 2024-08-01T19:11:53.554Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2024-06-04T06:15:09.677

Modified: 2026-04-08T18:21:04.920

Link: CVE-2024-2382

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.