Input validation vulnerability in CardGate Payments for WooCommerce 3.2.1

The CardGate Payments plugin used for online payments on WordPress websites has a security vulnerability. This vulnerability, known as Reflected Cross-Site Scripting, allows hackers to insert harmful code onto web pages. The plugin is vulnerable in all versions up to 3.2.1 because it does not properly filter and protect the input and output of the ‘page’ parameter. This means that hackers who are not logged in can inject their own code onto a page if they can convince a user to click on a link.

Detected in:

CardGate Payments for WooCommerce fixed vulnerable versions: >= * <= 3.2.1

This information is sourced from www.wpvulnerability.com. An open-source database of vulnerabilities maintained by the community. Help us out by submitting vulnerabilities!

Version compare shows which versions have a vulnerability. For example: >= 2.2.8 <= 2.2.21 means:

> from 2.2.8
= including 2.2.8 & 2.2.21
< to 2.2.21

Is this information incorrect? Please leave us a message.