PT-2026-36099 · Themeisle · The Otter Blocks – Gutenberg Blocks

Drew Webber

·

Published

2026-04-30

·

Updated

2026-04-30

·

CVE-2026-2892

CVSS v3.1

7.5

High

VectorAV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
The Otter Blocks plugin for WordPress is vulnerable to Purchase Verification Bypass in all versions up to, and including, 3.1.4. This is due to the 'get customer data' method relying on an unsigned 'o stripe data' cookie to determine Stripe product ownership for unauthenticated users. The 'check purchase' method trusts this cookie data without performing server-side verification against the Stripe API for one-time 'payment' mode purchases. This makes it possible for unauthenticated attackers to bypass Stripe purchase-gated content visibility conditions by forging the 'o stripe data' cookie with a target product ID, which is publicly exposed in the checkout block's HTML source.

Fix

Improper Authorization

Weakness Enumeration

Related Identifiers

CVE-2026-2892

Affected Products

The Otter Blocks – Gutenberg Blocks