CVE-2025-66152: CWE-862 Missing Authorization in merkulove Criptopayer for Elementor
Missing Authorization vulnerability in merkulove Criptopayer for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Criptopayer for Elementor: from n/a through 1.0.1.
AI Analysis
Technical Summary
CVE-2025-66152 is a vulnerability identified in the merkulove Criptopayer plugin for Elementor, a WordPress plugin designed to facilitate cryptocurrency payments. The issue stems from missing authorization controls (CWE-862), meaning the plugin fails to properly verify whether a user has the necessary permissions before allowing certain actions. This incorrect access control can be exploited by users with low privileges (PR:L) over the network (AV:N) without requiring user interaction (UI:N). The vulnerability impacts the integrity and availability of the system, as unauthorized users could manipulate payment processing or disrupt service availability. The CVSS v3.1 base score is 5.4, reflecting a medium severity level. The scope is unchanged (S:U), indicating the vulnerability affects only the vulnerable component. No patches have been released yet, and there are no known exploits in the wild. The vulnerability affects all versions up to 1.0.1, though exact affected versions are not fully enumerated. Given the plugin's role in handling payment transactions, exploitation could lead to unauthorized transaction modifications or denial of service conditions. The vulnerability was reserved in late 2025 and published at the end of 2025, indicating it is a recent discovery.
Potential Impact
For European organizations, especially those operating e-commerce platforms or websites accepting cryptocurrency payments via WordPress, this vulnerability poses a risk to transaction integrity and service availability. Unauthorized users could manipulate payment data, potentially causing financial discrepancies, loss of customer trust, or service outages. This could also lead to regulatory compliance issues under GDPR if customer data integrity is compromised. The medium severity score suggests moderate risk, but the financial nature of the plugin elevates the potential business impact. Organizations relying on this plugin may face operational disruptions or reputational damage if exploited. The lack of a patch increases exposure time, making proactive mitigation critical. The impact is more pronounced in sectors with high cryptocurrency transaction volumes or where Elementor and merkulove plugins are widely deployed.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict access control policies limiting plugin management to trusted administrators only. Review and harden WordPress user roles and permissions to ensure no unnecessary privileges are granted. Employ web application firewalls (WAFs) to detect and block suspicious requests targeting the plugin endpoints. Monitor logs for unusual activity related to Criptopayer plugin usage, such as unauthorized API calls or configuration changes. Consider temporarily disabling the plugin if feasible or replacing it with alternative payment solutions with verified security. Stay informed on vendor updates and apply patches immediately upon release. Conduct regular security audits focusing on plugin configurations and access controls. Additionally, educate site administrators about the risks of privilege escalation and the importance of minimal privilege principles.
Affected Countries
Germany, United Kingdom, France, Netherlands, Italy, Spain
CVE-2025-66152: CWE-862 Missing Authorization in merkulove Criptopayer for Elementor
Description
Missing Authorization vulnerability in merkulove Criptopayer for Elementor allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Criptopayer for Elementor: from n/a through 1.0.1.
AI-Powered Analysis
Technical Analysis
CVE-2025-66152 is a vulnerability identified in the merkulove Criptopayer plugin for Elementor, a WordPress plugin designed to facilitate cryptocurrency payments. The issue stems from missing authorization controls (CWE-862), meaning the plugin fails to properly verify whether a user has the necessary permissions before allowing certain actions. This incorrect access control can be exploited by users with low privileges (PR:L) over the network (AV:N) without requiring user interaction (UI:N). The vulnerability impacts the integrity and availability of the system, as unauthorized users could manipulate payment processing or disrupt service availability. The CVSS v3.1 base score is 5.4, reflecting a medium severity level. The scope is unchanged (S:U), indicating the vulnerability affects only the vulnerable component. No patches have been released yet, and there are no known exploits in the wild. The vulnerability affects all versions up to 1.0.1, though exact affected versions are not fully enumerated. Given the plugin's role in handling payment transactions, exploitation could lead to unauthorized transaction modifications or denial of service conditions. The vulnerability was reserved in late 2025 and published at the end of 2025, indicating it is a recent discovery.
Potential Impact
For European organizations, especially those operating e-commerce platforms or websites accepting cryptocurrency payments via WordPress, this vulnerability poses a risk to transaction integrity and service availability. Unauthorized users could manipulate payment data, potentially causing financial discrepancies, loss of customer trust, or service outages. This could also lead to regulatory compliance issues under GDPR if customer data integrity is compromised. The medium severity score suggests moderate risk, but the financial nature of the plugin elevates the potential business impact. Organizations relying on this plugin may face operational disruptions or reputational damage if exploited. The lack of a patch increases exposure time, making proactive mitigation critical. The impact is more pronounced in sectors with high cryptocurrency transaction volumes or where Elementor and merkulove plugins are widely deployed.
Mitigation Recommendations
Until an official patch is released, organizations should implement strict access control policies limiting plugin management to trusted administrators only. Review and harden WordPress user roles and permissions to ensure no unnecessary privileges are granted. Employ web application firewalls (WAFs) to detect and block suspicious requests targeting the plugin endpoints. Monitor logs for unusual activity related to Criptopayer plugin usage, such as unauthorized API calls or configuration changes. Consider temporarily disabling the plugin if feasible or replacing it with alternative payment solutions with verified security. Stay informed on vendor updates and apply patches immediately upon release. Conduct regular security audits focusing on plugin configurations and access controls. Additionally, educate site administrators about the risks of privilege escalation and the importance of minimal privilege principles.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- Patchstack
- Date Reserved
- 2025-11-21T11:23:07.865Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 6955a05adb813ff03e045d8d
Added to database: 12/31/2025, 10:14:50 PM
Last enriched: 1/21/2026, 12:36:53 AM
Last updated: 2/7/2026, 12:37:43 PM
Views: 33
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-2085: Command Injection in D-Link DWR-M921
HighCVE-2026-2084: OS Command Injection in D-Link DIR-823X
HighCVE-2026-2083: SQL Injection in code-projects Social Networking Site
MediumCVE-2026-2082: OS Command Injection in D-Link DIR-823X
MediumCVE-2026-2080: Command Injection in UTT HiPER 810
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.