Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62754: Missing Authorization in Kapil Paul Payment Gateway bKash for WC

0
Critical
VulnerabilityCVE-2025-62754cvecve-2025-62754
Published: Thu Jan 22 2026 (01/22/2026, 16:51:47 UTC)
Source: CVE Database V5
Vendor/Project: Kapil Paul
Product: Payment Gateway bKash for WC

Description

Missing Authorization vulnerability in Kapil Paul Payment Gateway bKash for WC woo-payment-bkash allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Payment Gateway bKash for WC: from n/a through <= 3.1.0.

AI-Powered Analysis

AILast updated: 01/30/2026, 09:35:41 UTC

Technical Analysis

CVE-2025-62754 identifies a critical missing authorization vulnerability in the Kapil Paul Payment Gateway bKash for WooCommerce (WC) plugin, specifically versions up to and including 3.1.0. This vulnerability arises from improperly configured access control mechanisms that fail to verify whether a user or request is authorized to perform certain sensitive operations within the payment gateway. As a result, an unauthenticated attacker can remotely exploit this flaw without any user interaction, bypassing security checks to execute unauthorized actions. The vulnerability impacts confidentiality and integrity, allowing attackers to potentially manipulate payment data, intercept or alter transactions, or gain access to sensitive financial information. The CVSS v3.1 base score of 9.1 reflects the ease of exploitation (network vector, no privileges required, no user interaction) combined with the high impact on confidentiality and integrity. Although no known exploits have been reported in the wild, the vulnerability poses a significant risk to e-commerce platforms relying on this plugin for processing bKash payments. The lack of available patches at the time of publication increases the urgency for organizations to apply mitigations or monitor closely for suspicious activity. The vulnerability is particularly relevant to WooCommerce installations that integrate the bKash payment gateway, a popular payment method in South Asia but also used by diaspora and international merchants, including those operating in Europe.

Potential Impact

For European organizations, the exploitation of this vulnerability could lead to severe financial losses through fraudulent transactions, unauthorized fund transfers, or theft of payment data. The compromise of payment gateway integrity undermines customer trust and can result in regulatory penalties under GDPR due to exposure of personal and financial data. E-commerce businesses using WooCommerce with the affected bKash plugin risk disruption of payment services, reputational damage, and potential legal liabilities. Given the critical nature of the vulnerability and the network-level exploitability without authentication, attackers could automate attacks at scale, affecting multiple merchants simultaneously. The impact extends beyond direct financial harm to include operational downtime and increased costs for incident response and remediation. Organizations with cross-border transactions involving bKash payments are particularly exposed, as attackers might exploit the gateway to intercept or manipulate international payments.

Mitigation Recommendations

1. Immediately audit all WooCommerce installations for the presence of the Kapil Paul Payment Gateway bKash plugin and identify versions at or below 3.1.0. 2. If an official patch is released, apply it without delay. 3. Until patches are available, implement strict network-level access controls to restrict access to the payment gateway endpoints only to trusted IP addresses or internal networks. 4. Employ Web Application Firewalls (WAFs) with custom rules to detect and block unauthorized access attempts targeting the payment gateway. 5. Monitor logs for unusual or unauthorized API calls or payment transactions indicative of exploitation attempts. 6. Enforce multi-factor authentication and role-based access controls on administrative interfaces related to payment processing. 7. Educate staff and customers about potential phishing or social engineering attacks that could be combined with this vulnerability. 8. Consider temporarily disabling the bKash payment option if risk tolerance is low and no immediate patch is available. 9. Coordinate with payment gateway vendors and WooCommerce support channels for updates and advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-10-21T14:59:54.788Z
Cvss Version
null
State
PUBLISHED

Threat ID: 697259104623b1157c7fab33

Added to database: 1/22/2026, 5:06:24 PM

Last enriched: 1/30/2026, 9:35:41 AM

Last updated: 2/5/2026, 8:14:53 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats