CVE-2025-6721: CWE-862 Missing Authorization in bandido MORKVA Vchasno Kasa Integration
The Vchasno Kasa plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the mrkv_vchasno_kasa_wc_do_metabox_action() function in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to generate invoices for arbitrary orders.
AI Analysis
Technical Summary
The CVE-2025-6721 vulnerability affects the bandido MORKVA Vchasno Kasa Integration plugin for WordPress, specifically all versions up to and including 1.0.3. The root cause is a missing capability check in the function mrkv_vchasno_kasa_wc_do_metabox_action(), which is responsible for handling metabox actions related to invoice generation. Because the plugin fails to verify whether the requester is authorized, unauthenticated attackers can invoke this function to generate invoices for arbitrary orders without any authentication or user interaction. This vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system does not properly enforce access control policies. The CVSS 3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack can be performed remotely over the network with low attack complexity, no privileges, and no user interaction, but it only results in limited confidentiality impact (unauthorized invoice data exposure) without affecting integrity or availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date (July 19, 2025).
Potential Impact
The primary impact of this vulnerability is unauthorized access to invoice data and the ability to generate invoices for arbitrary orders without authentication. While this does not directly compromise the integrity or availability of the system, it can lead to information disclosure of order details, potential financial discrepancies, and abuse of invoicing processes. Attackers could exploit this to create fraudulent invoices, causing confusion in financial records or enabling social engineering attacks against customers or staff. For e-commerce businesses relying on this plugin, this could undermine trust and lead to compliance issues related to data protection. The vulnerability's ease of exploitation and lack of required privileges increase the risk of opportunistic attacks, especially on sites that have not implemented additional access controls or monitoring.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately audit the authorization logic within the mrkv_vchasno_kasa_wc_do_metabox_action() function and implement strict capability checks to ensure only authenticated and authorized users can generate invoices. Until an official patch is released, administrators should consider disabling the Vchasno Kasa plugin or restricting access to the affected functionality via web application firewalls or custom code that enforces user authentication and role verification. Monitoring logs for unusual invoice generation activity can help detect exploitation attempts. Additionally, organizations should keep the plugin updated and subscribe to vendor or security mailing lists for timely patch releases. Employing a principle of least privilege for WordPress user roles and limiting plugin usage to trusted administrators can further reduce risk.
Affected Countries
United States, Germany, United Kingdom, Canada, Australia, Ukraine, Poland, Brazil, India, France
CVE-2025-6721: CWE-862 Missing Authorization in bandido MORKVA Vchasno Kasa Integration
Description
The Vchasno Kasa plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the mrkv_vchasno_kasa_wc_do_metabox_action() function in all versions up to, and including, 1.0.3. This makes it possible for unauthenticated attackers to generate invoices for arbitrary orders.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
The CVE-2025-6721 vulnerability affects the bandido MORKVA Vchasno Kasa Integration plugin for WordPress, specifically all versions up to and including 1.0.3. The root cause is a missing capability check in the function mrkv_vchasno_kasa_wc_do_metabox_action(), which is responsible for handling metabox actions related to invoice generation. Because the plugin fails to verify whether the requester is authorized, unauthenticated attackers can invoke this function to generate invoices for arbitrary orders without any authentication or user interaction. This vulnerability is classified under CWE-862 (Missing Authorization), indicating that the system does not properly enforce access control policies. The CVSS 3.1 base score is 5.3, with vector AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N, meaning the attack can be performed remotely over the network with low attack complexity, no privileges, and no user interaction, but it only results in limited confidentiality impact (unauthorized invoice data exposure) without affecting integrity or availability. No patches or official fixes are currently linked, and no known exploits have been reported in the wild as of the publication date (July 19, 2025).
Potential Impact
The primary impact of this vulnerability is unauthorized access to invoice data and the ability to generate invoices for arbitrary orders without authentication. While this does not directly compromise the integrity or availability of the system, it can lead to information disclosure of order details, potential financial discrepancies, and abuse of invoicing processes. Attackers could exploit this to create fraudulent invoices, causing confusion in financial records or enabling social engineering attacks against customers or staff. For e-commerce businesses relying on this plugin, this could undermine trust and lead to compliance issues related to data protection. The vulnerability's ease of exploitation and lack of required privileges increase the risk of opportunistic attacks, especially on sites that have not implemented additional access controls or monitoring.
Mitigation Recommendations
To mitigate this vulnerability, organizations should immediately audit the authorization logic within the mrkv_vchasno_kasa_wc_do_metabox_action() function and implement strict capability checks to ensure only authenticated and authorized users can generate invoices. Until an official patch is released, administrators should consider disabling the Vchasno Kasa plugin or restricting access to the affected functionality via web application firewalls or custom code that enforces user authentication and role verification. Monitoring logs for unusual invoice generation activity can help detect exploitation attempts. Additionally, organizations should keep the plugin updated and subscribe to vendor or security mailing lists for timely patch releases. Employing a principle of least privilege for WordPress user roles and limiting plugin usage to trusted administrators can further reduce risk.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- Wordfence
- Date Reserved
- 2025-06-26T14:07:49.904Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 687b3122a83201eaacfa3af7
Added to database: 7/19/2025, 5:46:10 AM
Last enriched: 2/26/2026, 3:46:22 PM
Last updated: 3/25/2026, 4:14:40 AM
Views: 141
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.