Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-11890: CWE-862 Missing Authorization in beycanpress Crypto Payment Gateway with Payeer for WooCommerce

0
High
VulnerabilityCVE-2025-11890cvecve-2025-11890cwe-862
Published: Tue Nov 04 2025 (11/04/2025, 04:27:16 UTC)
Source: CVE Database V5
Vendor/Project: beycanpress
Product: Crypto Payment Gateway with Payeer for WooCommerce

Description

The Crypto Payment Gateway with Payeer for WooCommerce plugin for WordPress is vulnerable to payment bypass in all versions up to, and including, 1.0.3. This is due to the plugin not properly verifying a payments status through server-side validation though the /wc-api/bp-payeer-gateway-callback endpoint. This makes it possible for unauthenticated attackers to update unpaid order statuses to paid resulting in a loss of revenue.

AI-Powered Analysis

AILast updated: 11/04/2025, 04:53:56 UTC

Technical Analysis

The vulnerability identified as CVE-2025-11890 affects the Crypto Payment Gateway with Payeer for WooCommerce plugin, widely used in WordPress e-commerce sites to facilitate cryptocurrency payments via the Payeer system. The core issue is a missing authorization check (CWE-862) on the server-side callback endpoint (/wc-api/bp-payeer-gateway-callback) responsible for updating payment statuses. This endpoint fails to verify that incoming payment status updates are legitimate and authorized, allowing unauthenticated attackers to send crafted requests that change order statuses from unpaid to paid without any actual transaction occurring. This bypass undermines the integrity of the payment process, enabling attackers to fraudulently confirm orders and receive goods or services without payment. The vulnerability affects all versions up to and including 1.0.3, with no authentication or user interaction required, making it remotely exploitable over the internet. The CVSS 3.1 base score is 7.5, reflecting the network attack vector, low attack complexity, no privileges required, and high impact on integrity, while confidentiality and availability remain unaffected. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to e-commerce merchants relying on this plugin for crypto payments. The lack of a patch at the time of disclosure necessitates immediate attention to alternative mitigations and monitoring. This vulnerability highlights the critical importance of robust server-side validation in payment processing systems, especially those handling cryptocurrency transactions, where transaction finality and fraud prevention are paramount.

Potential Impact

For European organizations operating WooCommerce stores with the vulnerable Crypto Payment Gateway with Payeer plugin, this vulnerability can lead to direct financial losses due to fraudulent order confirmations without actual payments. Attackers can exploit this flaw to obtain goods or services without paying, damaging revenue streams and potentially harming customer trust and brand reputation. The integrity of the order and payment system is compromised, which can also affect accounting and inventory management processes. Given the plugin’s role in processing cryptocurrency payments, the risk is amplified by the irreversible nature of crypto transactions and the difficulty in tracing fraudulent activities. Additionally, organizations may face regulatory scrutiny under European data protection and consumer protection laws if fraudulent transactions impact customers or financial reporting. The vulnerability could also be leveraged as part of broader fraud schemes targeting European e-commerce ecosystems, potentially affecting supply chains and partner networks. The absence of known exploits in the wild suggests a window for proactive defense, but the ease of exploitation and lack of authentication requirements make rapid exploitation plausible once public exploit code emerges.

Mitigation Recommendations

1. Monitor official vendor channels and security advisories for patches or updates addressing CVE-2025-11890 and apply them immediately upon release. 2. Until a patch is available, implement additional server-side validation by verifying payment statuses directly with the Payeer API before updating order statuses in WooCommerce. 3. Restrict access to the /wc-api/bp-payeer-gateway-callback endpoint using IP whitelisting or firewall rules to allow only trusted Payeer servers. 4. Enable detailed logging and alerting on order status changes, especially those transitioning from unpaid to paid, to detect suspicious activity promptly. 5. Conduct regular audits of order and payment records to identify anomalies indicative of exploitation attempts. 6. Educate e-commerce and IT teams about the vulnerability and encourage vigilance for unusual transaction patterns. 7. Consider deploying Web Application Firewalls (WAFs) with custom rules to block unauthorized requests targeting the vulnerable endpoint. 8. Evaluate alternative payment gateway plugins with stronger security postures if immediate patching is not feasible. 9. Ensure backups and incident response plans are updated to handle potential fraud incidents stemming from this vulnerability. 10. Collaborate with payment processors and financial institutions to monitor for fraudulent transactions linked to this exploit.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-10-16T19:01:24.095Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690984dc2b77ca42b4883e74

Added to database: 11/4/2025, 4:45:16 AM

Last enriched: 11/4/2025, 4:53:56 AM

Last updated: 11/5/2025, 3:27:48 PM

Views: 22

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats