PT-2026-36099 · Themeisle · The Otter Blocks – Gutenberg Blocks
Drew Webber
·
Published
2026-04-30
·
Updated
2026-04-30
·
CVE-2026-2892
CVSS v3.1
7.5
High
| Vector | AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
The Otter Blocks plugin for WordPress is vulnerable to Purchase Verification Bypass in all versions up to, and including, 3.1.4. This is due to the 'get customer data' method relying on an unsigned 'o stripe data' cookie to determine Stripe product ownership for unauthenticated users. The 'check purchase' method trusts this cookie data without performing server-side verification against the Stripe API for one-time 'payment' mode purchases. This makes it possible for unauthenticated attackers to bypass Stripe purchase-gated content visibility conditions by forging the 'o stripe data' cookie with a target product ID, which is publicly exposed in the checkout block's HTML source.
Fix
Improper Authorization
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
The Otter Blocks – Gutenberg Blocks