Home

Description

The Fortis for WooCommerce plugin for WordPress is vulnerable to authorization bypass due to an inverted nonce check in the 'check_fortis_notify_response' function in all versions up to, and including, 1.2.0. This makes it possible for unauthenticated attackers to update arbitrary WooCommerce order statuses to paid/processing/completed, effectively allowing them to mark orders as paid without payment.

PUBLISHED Reserved 2026-01-07 | Published 2026-02-04 | Updated 2026-02-04 | Assigner Wordfence




MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

CWE-862 Missing Authorization

Product status

Default status
unaffected

* (semver)
affected

Timeline

2026-02-03:Disclosed

Credits

Md. Moniruzzaman Prodhan finder

References

www.wordfence.com/...-3e99-4506-b517-ae4b838a0925?source=cve

plugins.trac.wordpress.org/.../classes/WC_Gateway_Fortis.php

plugins.trac.wordpress.org/.../classes/WC_Gateway_Fortis.php

cve.org (CVE-2026-0679)

nvd.nist.gov (CVE-2026-0679)

Download JSON