Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 08 Apr 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 04 Feb 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortispay
Fortispay fortis For Woocommerce Woocommerce Woocommerce woocommerce Wordpress Wordpress wordpress |
|
| Vendors & Products |
Fortispay
Fortispay fortis For Woocommerce Woocommerce Woocommerce woocommerce Wordpress Wordpress wordpress |
Wed, 04 Feb 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 04 Feb 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The Fortis for WooCommerce plugin for WordPress is vulnerable to authorization bypass due to an inverted nonce check in the 'check_fortis_notify_response' function in all versions up to, and including, 1.2.0. This makes it possible for unauthenticated attackers to update arbitrary WooCommerce order statuses to paid/processing/completed, effectively allowing them to mark orders as paid without payment. | |
| Title | Fortis for WooCommerce <= 1.2.0 - Missing Authorization to Unauthenticated Arbitrary Order Status Update to Paid via 'wc-api' Endpoint | |
| Weaknesses | CWE-862 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: Wordfence
Published:
Updated: 2026-04-08T17:11:54.036Z
Reserved: 2026-01-07T17:46:57.526Z
Link: CVE-2026-0679
Updated: 2026-02-04T16:51:31.532Z
Status : Deferred
Published: 2026-02-04T09:15:52.143
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-0679
No data.
OpenCVE Enrichment
Updated: 2026-04-15T19:00:12Z