Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-6721: CWE-862 Missing Authorization in bandido MORKVA Vchasno Kasa Integration

0
Medium
VulnerabilityCVE-2025-6721cvecve-2025-6721cwe-862
Published: Sat Jul 19 2025 (07/19/2025, 05:32:08 UTC)
Source: CVE Database V5
Vendor/Project: bandido
Product: MORKVA Vchasno Kasa Integration

Description

The Vchasno Kasa plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the mrkv_vchasno_kasa_wc_do_metabox_action() function in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to generate invoices for arbitrary orders.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/26/2026, 15:46:22 UTC

Technical Analysis

The CVE-2025-6721 vulnerability affects the bandido MORKVA Vchasno Kasa Integration plugin for WordPress, specifically all versions up to and including 1.0.3. The root cause is a missing capability check in the function mrkv_vchasno_kasa_wc_do_metabox_action(), which is responsible for handling metabox actions related to invoice generation. Because the plugin fails to verify whether the requester is authorized, unauthenticated attackers can invoke this function to generate invoices for arbitrary orders without any authentication or user interaction. This vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system does not properly enforce access control policies. The CVSS 3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack can be performed remotely over the network with low attack complexity, no privileges, and no user interaction, but it only results in limited confidentiality impact (unauthorized invoice data exposure) without affecting integrity or availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date (July 19, 2025).

Potential Impact

The primary impact of this vulnerability is unauthorized access to invoice data and the ability to generate invoices for arbitrary orders without authentication. While this does not directly compromise the integrity or availability of the system, it can lead to information disclosure of order details, potential financial discrepancies, and abuse of invoicing processes. Attackers could exploit this to create fraudulent invoices, causing confusion in financial records or enabling social engineering attacks against customers or staff. For e-commerce businesses relying on this plugin, this could undermine trust and lead to compliance issues related to data protection. The vulnerability's ease of exploitation and lack of required privileges increase the risk of opportunistic attacks, especially on sites that have not implemented additional access controls or monitoring.

Mitigation Recommendations

To mitigate this vulnerability, organizations should immediately audit the authorization logic within the mrkv_vchasno_kasa_wc_do_metabox_action() function and implement strict capability checks to ensure only authenticated and authorized users can generate invoices. Until an official patch is released, administrators should consider disabling the Vchasno Kasa plugin or restricting access to the affected functionality via web application firewalls or custom code that enforces user authentication and role verification. Monitoring logs for unusual invoice generation activity can help detect exploitation attempts. Additionally, organizations should keep the plugin updated and subscribe to vendor or security mailing lists for timely patch releases. Employing a principle of least privilege for WordPress user roles and limiting plugin usage to trusted administrators can further reduce risk.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
Wordfence
Date Reserved
2025-06-26T14:07:49.904Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 687b3122a83201eaacfa3af7

Added to database: 7/19/2025, 5:46:10 AM

Last enriched: 2/26/2026, 3:46:22 PM

Last updated: 3/25/2026, 4:14:40 AM

Views: 141

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses