CVE-2023-6064: CWE-200 Information Exposure in Unknown PayHere Payment Gateway
The PayHere Payment Gateway WordPress plugin before 2.2.12 automatically creates publicly-accessible log files containing sensitive information when transactions occur.
AI Analysis
Technical Summary
CVE-2023-6064 is a high-severity information exposure vulnerability affecting the PayHere Payment Gateway WordPress plugin versions prior to 2.2.12. The vulnerability arises because the plugin automatically generates log files that are publicly accessible on the web server whenever payment transactions occur. These log files contain sensitive information related to the transactions, which could include personally identifiable information (PII), payment details, or other confidential data. Since the logs are accessible without authentication or user interaction, any attacker or unauthorized user can retrieve these files simply by knowing or guessing their location. The vulnerability is classified under CWE-200 (Information Exposure), indicating that sensitive information is inadvertently disclosed to unauthorized parties. The CVSS 3.1 base score of 7.5 reflects a high severity due to the ease of remote exploitation (network vector, no privileges required, no user interaction) and the high impact on confidentiality, although integrity and availability are not affected. No known exploits are currently reported in the wild, and no official patches or updates are linked yet, but the issue is publicly disclosed and documented by WPScan and CVE databases. This vulnerability specifically targets WordPress sites using the PayHere Payment Gateway plugin, which is a niche but critical component for e-commerce and online payment processing on WordPress platforms.
Potential Impact
For European organizations, especially those operating e-commerce websites or online services using WordPress with the PayHere Payment Gateway plugin, this vulnerability poses a significant risk to customer data confidentiality. Exposure of sensitive payment transaction logs can lead to data breaches involving customer names, payment details, and potentially other personal information protected under GDPR. Such breaches can result in regulatory penalties, loss of customer trust, and reputational damage. Additionally, exposed payment information could facilitate fraud, identity theft, or targeted phishing attacks against affected customers. Since the vulnerability does not affect integrity or availability, the primary concern is unauthorized data disclosure. The ease of exploitation (no authentication or user interaction required) increases the likelihood of automated scanning and data harvesting by malicious actors. European organizations must consider the compliance implications under GDPR and the potential financial and operational impacts of a data breach stemming from this vulnerability.
Mitigation Recommendations
Immediate mitigation steps include: 1) Updating the PayHere Payment Gateway plugin to version 2.2.12 or later once available, as this will likely address the issue by restricting log file access or disabling public logging. 2) Until an official patch is released, administrators should manually restrict access to the log files by configuring web server rules (e.g., .htaccess for Apache or equivalent for Nginx) to deny public access to the log directory or files. 3) Review and audit existing log files for any sensitive data exposure and securely delete or archive them offline. 4) Implement monitoring and alerting for unauthorized access attempts to log files or unusual file access patterns. 5) Consider disabling logging features in the plugin if feasible without disrupting payment processing. 6) Conduct a thorough security review of all WordPress plugins and ensure minimal exposure of sensitive data through logs or other mechanisms. 7) Educate development and operations teams about secure logging practices and the risks of publicly accessible sensitive information. These targeted mitigations go beyond generic advice by focusing on immediate access control and log management specific to this vulnerability.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2023-6064: CWE-200 Information Exposure in Unknown PayHere Payment Gateway
Description
The PayHere Payment Gateway WordPress plugin before 2.2.12 automatically creates publicly-accessible log files containing sensitive information when transactions occur.
AI-Powered Analysis
Technical Analysis
CVE-2023-6064 is a high-severity information exposure vulnerability affecting the PayHere Payment Gateway WordPress plugin versions prior to 2.2.12. The vulnerability arises because the plugin automatically generates log files that are publicly accessible on the web server whenever payment transactions occur. These log files contain sensitive information related to the transactions, which could include personally identifiable information (PII), payment details, or other confidential data. Since the logs are accessible without authentication or user interaction, any attacker or unauthorized user can retrieve these files simply by knowing or guessing their location. The vulnerability is classified under CWE-200 (Information Exposure), indicating that sensitive information is inadvertently disclosed to unauthorized parties. The CVSS 3.1 base score of 7.5 reflects a high severity due to the ease of remote exploitation (network vector, no privileges required, no user interaction) and the high impact on confidentiality, although integrity and availability are not affected. No known exploits are currently reported in the wild, and no official patches or updates are linked yet, but the issue is publicly disclosed and documented by WPScan and CVE databases. This vulnerability specifically targets WordPress sites using the PayHere Payment Gateway plugin, which is a niche but critical component for e-commerce and online payment processing on WordPress platforms.
Potential Impact
For European organizations, especially those operating e-commerce websites or online services using WordPress with the PayHere Payment Gateway plugin, this vulnerability poses a significant risk to customer data confidentiality. Exposure of sensitive payment transaction logs can lead to data breaches involving customer names, payment details, and potentially other personal information protected under GDPR. Such breaches can result in regulatory penalties, loss of customer trust, and reputational damage. Additionally, exposed payment information could facilitate fraud, identity theft, or targeted phishing attacks against affected customers. Since the vulnerability does not affect integrity or availability, the primary concern is unauthorized data disclosure. The ease of exploitation (no authentication or user interaction required) increases the likelihood of automated scanning and data harvesting by malicious actors. European organizations must consider the compliance implications under GDPR and the potential financial and operational impacts of a data breach stemming from this vulnerability.
Mitigation Recommendations
Immediate mitigation steps include: 1) Updating the PayHere Payment Gateway plugin to version 2.2.12 or later once available, as this will likely address the issue by restricting log file access or disabling public logging. 2) Until an official patch is released, administrators should manually restrict access to the log files by configuring web server rules (e.g., .htaccess for Apache or equivalent for Nginx) to deny public access to the log directory or files. 3) Review and audit existing log files for any sensitive data exposure and securely delete or archive them offline. 4) Implement monitoring and alerting for unauthorized access attempts to log files or unusual file access patterns. 5) Consider disabling logging features in the plugin if feasible without disrupting payment processing. 6) Conduct a thorough security review of all WordPress plugins and ensure minimal exposure of sensitive data through logs or other mechanisms. 7) Educate development and operations teams about secure logging practices and the risks of publicly accessible sensitive information. These targeted mitigations go beyond generic advice by focusing on immediate access control and log management specific to this vulnerability.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- WPScan
- Date Reserved
- 2023-11-09T19:37:57.339Z
- Cisa Enriched
- true
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 682d9815c4522896dcbd63f9
Added to database: 5/21/2025, 9:08:37 AM
Last enriched: 7/3/2025, 3:39:35 PM
Last updated: 8/17/2025, 6:44:43 PM
Views: 14
Related Threats
CVE-2025-53948: CWE-415 Double Free in Santesoft Sante PACS Server
HighCVE-2025-52584: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-46269: CWE-122 Heap-based Buffer Overflow in Ashlar-Vellum Cobalt
HighCVE-2025-54862: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumCVE-2025-54759: CWE-79 Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') in Santesoft Sante PACS Server
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
External Links
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.