CVE-2020-8819:
CardGate Payments plugin for WooCommerce does not validate request origin
8.1
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.50556%
CWE
Published
5/24/2022
Updated
7/12/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
cardgate/woocommerce | composer | <= 3.1.15 | 3.1.16 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stems from the cardgate_callback function in cardgate.php (lines 426-442 in the pre-patch version). This function processes incoming 'cgp_sitesetup' requests by invoking pullConfig with attacker-controlled $_REQUEST parameters. The lack of origin validation (e.g., IP checks, HMAC signatures, or CSRF tokens) allows unauthorized parties to submit malicious configuration updates. The patch in commit 0b83588 modifies this flow by introducing proper authentication checks, confirming this was the vulnerable code path. The exploit PoC specifically targets this endpoint to overwrite merchant settings, demonstrating the function's insecure implementation.