CVE-2026-39609
Received Received - Intake
Missing Authorization in Wava Payment Allows Unauthorized Access

Publication date: 2026-04-08

Last updated on: 2026-04-29

Assigner: Patchstack

Description
Missing Authorization vulnerability in Wava.co Wava Payment wava-payment allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Wava Payment: from n/a through <= 0.3.7.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-04-08
Last Modified
2026-04-29
Generated
2026-05-07
AI Q&A
2026-04-08
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
wava payment to 0.3.7 (inc)
wava wava_payment From 0.0.0 (inc) to 0.3.7 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-862 The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-39609 is a Broken Access Control vulnerability in the WordPress Wava Payment Plugin versions up to and including 0.3.7. It occurs due to missing authorization, authentication, or nonce token checks within certain plugin functions.

This flaw allows unauthenticated users to perform actions that normally require higher privileges, meaning attackers can exploit the plugin to bypass security controls.

The vulnerability is classified under the OWASP Top 10 category A1: Broken Access Control and has a CVSS severity score of 5.3, indicating a low priority threat with limited impact.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The vulnerability in Wava Payment Plugin (CVE-2026-39609) is a Broken Access Control issue that allows unauthenticated users to perform actions requiring higher privileges. Such unauthorized access could potentially lead to exposure or manipulation of sensitive data.

While the provided information does not explicitly mention compliance with standards like GDPR or HIPAA, missing authorization and broken access control vulnerabilities generally pose risks to data confidentiality and integrity, which are critical aspects of these regulations.

Therefore, exploitation of this vulnerability could negatively impact compliance with data protection regulations by enabling unauthorized access to protected information.


How can this vulnerability impact me? :

This vulnerability could allow attackers to perform unauthorized actions on websites using the affected Wava Payment Plugin, potentially compromising the integrity of payment processes or other privileged operations.

Although the risk is considered low and exploitation unlikely, attackers might use this flaw in mass-exploit campaigns targeting many websites indiscriminately.

Immediate mitigation involves updating the plugin to a secure version or seeking assistance from hosting providers or web developers to protect affected sites.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

The vulnerability arises from missing authorization, authentication, or nonce token checks within certain plugin functions, allowing unauthenticated users to perform privileged actions.

Detection would involve checking if the WordPress Wava Payment Plugin version is up to and including 0.3.7, as these versions are affected.

No specific commands or network detection methods are provided in the available information.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation involves updating the affected Wava Payment plugin to a version later than 0.3.7 if available.

If updating is not possible, users are advised to seek assistance from their hosting provider or web developer.

Patchstack offers vulnerability mitigation services and security intelligence to help protect affected sites.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart