Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66107: Missing Authorization in Scott Paterson Subscriptions & Memberships for PayPal

0
Medium
VulnerabilityCVE-2025-66107cvecve-2025-66107
Published: Fri Nov 21 2025 (11/21/2025, 12:30:04 UTC)
Source: CVE Database V5
Vendor/Project: Scott Paterson
Product: Subscriptions & Memberships for PayPal

Description

Missing Authorization vulnerability in Scott Paterson Subscriptions & Memberships for PayPal subscriptions-memberships-for-paypal allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Subscriptions & Memberships for PayPal: from n/a through <= 1.1.7.

AI-Powered Analysis

AILast updated: 12/01/2025, 18:21:59 UTC

Technical Analysis

CVE-2025-66107 identifies a Missing Authorization vulnerability in the Scott Paterson Subscriptions & Memberships for PayPal WordPress plugin, specifically affecting all versions up to and including 1.1.7. This vulnerability arises from incorrectly configured access control security levels, allowing remote attackers to access certain functionalities or data without proper authorization. The vulnerability does not require any authentication or user interaction, making it remotely exploitable over the network. The CVSS 3.1 base score is 5.3 (medium), reflecting a network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), and no user interaction (UI:N). The impact is limited to confidentiality (C:L), with no impact on integrity or availability. The plugin is used to manage subscriptions and memberships via PayPal integration, meaning unauthorized access could expose subscription details or user information. There are no known public exploits or patches available at the time of publication. The vulnerability was published on November 21, 2025, and assigned by Patchstack. The lack of patch links suggests that vendors or maintainers have yet to release a fix, increasing the urgency for organizations to implement compensating controls. The vulnerability’s root cause is an incorrect or missing authorization check in the plugin’s access control mechanisms, which could be exploited by attackers to bypass restrictions and access sensitive subscription-related data or functionality.

Potential Impact

For European organizations, the impact primarily concerns confidentiality breaches involving subscription and membership data managed through the affected plugin. Exposure of such data could lead to privacy violations, regulatory non-compliance (e.g., GDPR), and reputational damage. Although the vulnerability does not affect data integrity or system availability, unauthorized access to subscription details could facilitate further targeted attacks, social engineering, or fraud. Organizations relying on this plugin for e-commerce or membership management may face risks of customer data leakage. Given the plugin’s integration with PayPal, attackers might also attempt to leverage exposed information for financial fraud or account takeover attempts. The medium severity rating indicates a moderate risk, but the ease of exploitation without authentication increases the urgency for mitigation. European entities with high volumes of online transactions or membership services are particularly vulnerable. Additionally, failure to address this vulnerability could attract regulatory scrutiny under data protection laws, especially if personal data is compromised.

Mitigation Recommendations

1. Immediately audit and restrict access controls within the Subscriptions & Memberships for PayPal plugin, ensuring that all sensitive endpoints enforce proper authorization checks. 2. If a vendor patch becomes available, prioritize its deployment across all affected systems without delay. 3. Implement Web Application Firewall (WAF) rules to monitor and block unauthorized access attempts targeting the plugin’s endpoints. 4. Conduct thorough logging and monitoring of subscription-related API calls to detect anomalous or unauthorized activity. 5. Limit exposure by disabling or removing the plugin if it is not essential, or replace it with a more secure alternative. 6. Review user roles and permissions within the WordPress environment to minimize privilege escalation risks. 7. Educate administrators on secure plugin configuration and the importance of timely updates. 8. Perform regular vulnerability scans focusing on WordPress plugins to identify similar misconfigurations. 9. Coordinate with legal and compliance teams to assess potential GDPR implications and prepare incident response plans. 10. Engage with the plugin vendor or community to track patch releases and security advisories.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Patchstack
Date Reserved
2025-11-21T11:21:20.344Z
Cvss Version
null
State
PUBLISHED

Threat ID: 69205c33c36be036e6ff27b1

Added to database: 11/21/2025, 12:33:55 PM

Last enriched: 12/1/2025, 6:21:59 PM

Last updated: 1/7/2026, 8:47:40 AM

Views: 27

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats