Plisio Accept Cryptocurrencies Plugin Missing Authorization Vulnerability (CVE-2026-6372)
A missing authorization vulnerability in the Plisio Accept Cryptocurrencies with Plisio WordPress plugin (versions up to 2.0.5) allows attackers to bypass payment verification due to incorrectly configured access control security levels.
CVE-2026-6372 is a missing authorization vulnerability affecting the Plisio Accept Cryptocurrencies with Plisio WordPress plugin, specifically versions from initial releases through 2.0.5. Discovered by Patchstack, the vulnerability stems from incorrectly configured access control security levels within the plugin. An attacker can exploit this flaw to bypass payment verification processes, potentially leading to unauthorized transactions or manipulation of payment-related functionalities. Given the increasing adoption of cryptocurrency payments, this vulnerability presents a significant risk to e-commerce sites using the affected plugin. Successful exploitation can result in financial losses and reputational damage.
Attack Chain
- Attacker identifies a WordPress site using the vulnerable Plisio plugin (version <= 2.0.5).
- Attacker analyzes the plugin’s code or intercepts network traffic to identify the specific endpoint or function responsible for payment verification lacking proper authorization checks.
- The attacker crafts a malicious HTTP request to the vulnerable endpoint, bypassing the intended authentication or authorization mechanisms.
- The crafted request modifies payment parameters (e.g., amount, recipient) without proper validation.
- The modified request is sent to the server, which processes it without correctly verifying the user’s authority.
- The server updates the payment status, marking it as “paid” or “verified,” even though the actual payment might be incomplete, altered, or entirely missing.
- The WordPress site delivers goods or services based on the fraudulently verified payment status.
Impact
Successful exploitation of CVE-2026-6372 allows attackers to bypass payment verification processes in e-commerce sites using the Plisio Accept Cryptocurrencies plugin. This can lead to financial losses for the site owner due to unauthorized transactions. The vulnerability affects all installations using versions up to and including 2.0.5. Given the potential for widespread impact on any site accepting cryptocurrency via this plugin, this issue represents a high risk.
Recommendation
- Upgrade the Plisio Accept Cryptocurrencies with Plisio plugin to a version greater than 2.0.5 to patch CVE-2026-6372.
- Deploy the Sigma rule
Detect Plisio Payment Bypass Attemptto monitor for exploit attempts targeting the vulnerable endpoint. - Examine web server logs for suspicious POST requests to payment processing endpoints associated with the Plisio plugin, filtering for unexpected parameter modifications (log source: webserver).
Detection coverage 2
Detect Plisio Payment Bypass Attempt
highDetects potential payment bypass attempts against the Plisio WordPress plugin by monitoring for suspicious POST requests to payment processing endpoints.
Detect Plisio Plugin Directory Access
lowDetects access to the Plisio plugin directory which might indicate reconnaissance attempts.
Detection queries are kept inside the platform. Get full rules →
Indicators of compromise
1
url
| Type | Value |
|---|---|
| url | https://patchstack.com/database/wordpress/plugin/plisio-payment-gateway-for-woocommerce/vulnerability/wordpress-accept-cryptocurrencies-with-plisio-plugin-2-0-5-payment-bypass-vulnerability?_s_id=cve |