Description
The Campay Woocommerce Payment Gateway plugin for WordPress is vulnerable to Unauthenticated Payment Bypass in all versions up to, and including, 1.2.2. This is due to the plugin not properly validating that a transaction has occurred through the payment gateway. This makes it possible for unauthenticated attackers to bypass payments and mark orders as successfully completed resulting in a loss of income.
Published: 2025-12-12
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Unauthenticated payment bypass that can cause loss of revenue
Action: Apply patch
AI Analysis

Impact

The vulnerability resides in the Campay Woocommerce Payment Gateway plugin for WordPress up to version 1.2.2. It originates from insufficient validation that a transaction has actually passed through the payment gateway. Consequently, an attacker who does not need to authenticate can submit a crafted request to mark an order as completed, thereby bypassing the legitimate payment process and causing a loss of income for the merchant. This issue is identified as CWE‑639, an authorization bypass that occurs through user‑controlled data.

Affected Systems

WordPress sites running the Campay Woocommerce Payment Gateway plugin, specifically those using version 1.2.2 or any earlier release.

Risk and Exploitability

The CVSS score of 5.3 indicates moderate severity, and the EPSS score of less than 1% suggests a low probability of widespread exploitation. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, it is inferred that the attacker can exploit this weakness by sending an unauthenticated HTTP request to the plugin’s payment completion endpoint, thereby bypassing payment validation and marking orders as complete.

Generated by OpenCVE AI on April 22, 2026 at 16:13 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Campay Woocommerce Payment Gateway plugin to version 1.2.3 or later to address the validation flaw.
  • Ensure that the plugin rejects any order completion requests that do not contain an authenticated payment record.
  • Implement logging and monitoring of order status changes to detect and investigate any unauthorized completion events.

Generated by OpenCVE AI on April 22, 2026 at 16:13 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 17:00:00 +0000


Mon, 15 Dec 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 12 Dec 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Campay
Campay woocommerce Payment Gateway
Wordpress
Wordpress wordpress
Vendors & Products Campay
Campay woocommerce Payment Gateway
Wordpress
Wordpress wordpress

Fri, 12 Dec 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Campay Woocommerce Payment Gateway plugin for WordPress is vulnerable to Unauthenticated Payment Bypass in all versions up to, and including, 1.2.2. This is due to the plugin not properly validating that a transaction has occurred through the payment gateway. This makes it possible for unauthenticated attackers to bypass payments and mark orders as successfully completed resulting in a loss of income.
Title Campay Woocommerce Payment Gateway <= 1.2.2 - Unauthenticated Payment Bypass
Weaknesses CWE-639
References
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N'}


Subscriptions

Campay Woocommerce Payment Gateway
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:44:35.767Z

Reserved: 2025-11-07T16:28:23.616Z

Link: CVE-2025-12883

cve-icon Vulnrichment

Updated: 2025-12-15T18:07:20.410Z

cve-icon NVD

Status : Deferred

Published: 2025-12-12T04:15:40.470

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12883

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T16:15:21Z

Weaknesses