The Japanized for WooCommerce plugin for WordPress is vulnerable to Improper Authentication in versions up to, and including, 2.8.4. This is due to a flawed permission check in the `paidy_webhook_permission_check` function that unconditionally returns `true` when the webhook signature header is omitted. This makes it possible for unauthenticated attackers to bypass payment verification and fraudulently mark orders as "Processing" or "Completed" without actual payment via a crafted POST request to the Paidy webhook endpoint.

Project Subscriptions

Vendors Products
Shoheitanaka Subscribe
Japanized For Woocommerce Subscribe
Wordpress Subscribe
Wordpress Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Fri, 27 Feb 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Shoheitanaka
Shoheitanaka japanized For Woocommerce
Wordpress
Wordpress wordpress
Vendors & Products Shoheitanaka
Shoheitanaka japanized For Woocommerce
Wordpress
Wordpress wordpress
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:45:00 +0000

Type Values Removed Values Added
Description The Japanized for WooCommerce plugin for WordPress is vulnerable to Improper Authentication in versions up to, and including, 2.8.4. This is due to a flawed permission check in the `paidy_webhook_permission_check` function that unconditionally returns `true` when the webhook signature header is omitted. This makes it possible for unauthenticated attackers to bypass payment verification and fraudulently mark orders as "Processing" or "Completed" without actual payment via a crafted POST request to the Paidy webhook endpoint.
Title Japanized for WooCommerce <= 2.8.4 - Missing Authorization to Unauthenticated Paidy Order Manipulation
Weaknesses CWE-287
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-02-27T15:39:31.362Z

Reserved: 2026-01-21T19:03:56.817Z

Link: CVE-2026-1305

cve-icon Vulnrichment

Updated: 2026-02-27T15:39:23.080Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-02-27T10:16:21.863

Modified: 2026-02-27T14:06:37.987

Link: CVE-2026-1305

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-02-27T16:05:50Z

Weaknesses