Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-64638: Missing Authorization in OnPay.io OnPay.io for WooCommerce

0
Medium
VulnerabilityCVE-2025-64638cvecve-2025-64638
Published: Tue Dec 16 2025 (12/16/2025, 08:12:51 UTC)
Source: CVE Database V5
Vendor/Project: OnPay.io
Product: OnPay.io for WooCommerce

Description

Missing Authorization vulnerability in OnPay.io OnPay.io for WooCommerce onpay-io-for-woocommerce allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects OnPay.io for WooCommerce: from n/a through <= 1.0.47.

AI-Powered Analysis

AILast updated: 01/21/2026, 00:14:19 UTC

Technical Analysis

CVE-2025-64638 identifies a missing authorization vulnerability in the OnPay.io for WooCommerce plugin, versions up to and including 1.0.47. The vulnerability stems from incorrectly configured access control security levels, which allow remote attackers to bypass authorization checks. This means that an unauthenticated attacker can access certain resources or data that should be restricted, potentially exposing sensitive information related to payment processing or customer data. The vulnerability is exploitable over the network without requiring any privileges or user interaction, increasing its accessibility to attackers. However, the impact is limited to confidentiality as there is no indication of integrity or availability compromise. The CVSS v3.1 score is 5.3 (medium severity), reflecting the ease of exploitation but limited impact scope. No public exploits have been reported yet, and no patches are currently linked, indicating that vendors or users must remain vigilant for forthcoming updates. The vulnerability affects the OnPay.io payment integration plugin for WooCommerce, a widely used e-commerce platform on WordPress, which is popular among European online retailers. The flaw could allow attackers to gather sensitive information that might be leveraged for further attacks or fraud. Given the nature of the vulnerability, it is critical for organizations to review their WooCommerce plugin configurations and monitor for vendor patches.

Potential Impact

For European organizations, this vulnerability poses a risk primarily to confidentiality, potentially exposing sensitive payment or customer data handled via the OnPay.io WooCommerce plugin. While it does not directly affect data integrity or system availability, unauthorized data access can lead to privacy violations, regulatory non-compliance (e.g., GDPR), and reputational damage. E-commerce businesses relying on WooCommerce with OnPay.io integration are at risk of data leakage, which could facilitate fraud or phishing attacks. The lack of authentication and user interaction requirements means attackers can exploit this vulnerability remotely and at scale, increasing the threat surface. Organizations in Europe with significant online retail operations could face increased scrutiny from regulators if such data exposures occur. The medium severity rating suggests a moderate but non-critical threat, yet the potential for cascading effects through exposed data should not be underestimated.

Mitigation Recommendations

Organizations should immediately audit their WooCommerce installations to identify if OnPay.io for WooCommerce plugin versions up to 1.0.47 are in use. Until a patch is released, restrict access to the plugin’s administrative and API endpoints via network-level controls such as firewalls or web application firewalls (WAFs). Implement strict role-based access controls within WordPress to limit who can interact with the plugin’s features. Monitor logs for unusual access patterns or unauthorized requests targeting OnPay.io endpoints. Engage with OnPay.io vendor channels to track patch releases and apply updates promptly once available. Additionally, conduct regular security assessments of e-commerce platforms and ensure compliance with GDPR data protection requirements. Consider isolating payment processing components and encrypting sensitive data at rest and in transit to reduce exposure. Finally, educate staff on the risks of unauthorized data access and maintain incident response plans tailored to e-commerce environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-06T13:11:11.071Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6941174f594e45819d70c5ae

Added to database: 12/16/2025, 8:24:47 AM

Last enriched: 1/21/2026, 12:14:19 AM

Last updated: 2/5/2026, 12:07:44 AM

Views: 30

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats