Impact
The Crypto Payment Gateway with Payeer for WooCommerce plugin allows attackers to change the status of an unpaid order to paid without authentication. The flaw is caused by missing server‑side validation on the /wc-api/bp-payeer-gateway-callback endpoint, which lets an attacker forge a request and trigger state changes. This results in unauthorized revenue loss and violates the integrity of transaction data.
Affected Systems
WordPress sites using the beycanpress Crypto Payment Gateway with Payeer for WooCommerce plugin, versions <= 1.0.3.
Risk and Exploitability
The vulnerability has a CVSS score of 7.5, indicating high severity, while the EPSS score is below 1% suggesting exploitation is unlikely but still possible. It is not listed in CISA's KEV catalog. Based on the description, the likely attack vector is an unauthenticated HTTP request to the payment callback endpoint, allowing the attacker to modify order status server‑side.
OpenCVE Enrichment