CVE-2025-11890
Crypto · Crypto Payment Gateway with Payeer for WooCommerce plugin for WordPress
A high-severity vulnerability has been discovered in the "Crypto Payment Gateway with Payeer for WooCommerce" WordPress plugin, which allows an attacker to bypass the payment process.
Executive summary
A high-severity vulnerability has been discovered in the "Crypto Payment Gateway with Payeer for WooCommerce" WordPress plugin, which allows an attacker to bypass the payment process. Successful exploitation of this flaw could result in direct financial loss, as attackers could obtain goods or services from an e-commerce store without submitting a valid payment. This poses a significant and immediate threat to the revenue and integrity of any business utilizing this plugin.
Vulnerability
The vulnerability exists within the payment confirmation handling process of the plugin. An attacker can manipulate the data sent back to the WooCommerce store after being redirected to the payment gateway, falsely signaling that a payment was successful. The plugin fails to properly validate the authenticity and status of the payment confirmation callback from the Payeer service, allowing an unauthenticated attacker to complete an order without rendering payment, thereby bypassing the entire payment mechanism.
Business impact
This vulnerability is classified as High severity with a CVSS score of 7.5. The primary business impact is direct financial loss resulting from fraudulent orders and theft of goods or services. Exploitation can lead to significant revenue leakage, inaccurate sales reporting, and loss of inventory. Additionally, the organization may incur operational costs related to identifying and reconciling fraudulent transactions and could suffer reputational damage if the vulnerability is widely exploited, eroding customer trust.
Remediation
Immediate Action: Immediately update the "Crypto Payment Gateway with Payeer for WooCommerce" plugin to the latest version that addresses this vulnerability. If this plugin is no longer essential for business operations, it should be deactivated and completely removed from the WordPress installation to eliminate the associated risk.
Proactive Monitoring: Monitor web server access logs and WooCommerce order logs for anomalies. Specifically, look for completed orders that lack a corresponding successful transaction record in the official Payeer merchant account dashboard. Implement alerts for unusual spikes in order volume or multiple orders from the same IP address in a short period, as this could indicate automated exploitation attempts.
Compensating Controls: If patching cannot be performed immediately, temporarily disable the "Crypto Payment Gateway with Payeer" payment option on the checkout page. Implement a manual order verification process, requiring staff to confirm receipt of payment in the Payeer merchant account before any goods are shipped or services are rendered. A Web Application Firewall (WAF) rule could also be configured to inspect and potentially block malformed callback requests to the payment confirmation URL.
Exploitation status
Public Exploit Available: false
Analyst recommendation
This vulnerability presents a direct and serious threat to the organization's e-commerce revenue stream. Given the High severity rating (CVSS 7.5) and the straightforward nature of the exploit, immediate action is required. We strongly recommend that all WordPress sites using the affected plugin be patched immediately by updating to the latest version. While this CVE is not currently on the CISA KEV list, the potential for immediate financial loss warrants treating this vulnerability with the highest priority.