CVE-2026-33661 - Vulnerability Analysis
HighCVSS: 8.6Last Updated: March 26, 2026
Pay - Authentication Bypass
Overview
Pay < 3.7.20 contains a broken authentication caused by unconditional skipping of signature verification when PSR-7 request host is localhost in verify_wechat_sign(), letting attackers forge WeChat Pay success notifications, exploit requires sending crafted HTTP request with Host: localhost header.
Severity & Score
Impact
Attackers can forge payment success notifications, causing applications to mark orders as paid without actual payment.
Mitigation
Update to version 3.7.20 or later.
References
Social Media Activity(2 posts)
š CVE-2026-33661 - High (8.6) Pay is an open-source payment SDK extension package for various Chinese payment services. Prior to version 3.7.20, the `verify_wechat_sign()` function in `src/Functions.php` unconditionally skips all signature verification when the PSR-7 request r... š https://www.thehackerwire.com/vulnerability/CVE-2026-33661/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postš CVE-2026-33661 - High (8.6) Pay is an open-source payment SDK extension package for various Chinese payment services. Prior to version 3.7.20, the `verify_wechat_sign()` function in `src/Functions.php` unconditionally skips all signature verification when the PSR-7 request r... š https://www.thehackerwire.com/vulnerability/CVE-2026-33661/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-33661
- Severity
- High
- CVSS Score
- 8.6
- Type
- broken_authentication
- Status
- new
- EPSS
- 0.0%
- Social Posts
- 2
CWE
- CWE-290
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N