Description
Authentication Bypass Using an Alternate Path or Channel vulnerability in Convers Lab WP SmartPay smartpay allows Authentication Abuse.This issue affects WP SmartPay: from n/a through <= 2.7.13.
Published: 2025-06-27
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

WordPress WP SmartPay plugin contains an authentication bypass flaw that allows an attacker to gain unauthorized access by following an alternate path or channel. The vulnerability is classified as CWE‑288, indicating improper authentication. Successful exploitation results in an attacker taking control of a user account, potentially with full site privileges, leading to data theft, site manipulation, or further compromise.

Affected Systems

Convers Lab’s WP SmartPay plugin for WordPress, versions up through 2.7.13, is affected. Any WordPress site that has not upgraded beyond this version could be vulnerable.

Risk and Exploitability

The CVSS score of 8.8 indicates high severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the near term. The vulnerability is not listed in CISA’s KEV catalog. Based on the description, the likely attack vector involves sending a crafted HTTP request to an alternate endpoint within the WordPress site to bypass authentication. An attacker with network access to the site can execute this bypass remotely, potentially enabling account takeover.

Generated by OpenCVE AI on May 2, 2026 at 01:14 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the latest version of WP SmartPay (2.7.14 or later) to fix the authentication bypass.
  • If upgrading is not immediately possible, remove or disable the WP SmartPay plugin to eliminate the vulnerable path.
  • Configure web server or firewall rules to restrict or block access to any alternate authentication endpoints used by the plugin, thereby preventing the bypass.

Generated by OpenCVE AI on May 2, 2026 at 01:14 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-19262 Authentication Bypass Using an Alternate Path or Channel vulnerability in ThemesGrove WP SmartPay allows Authentication Abuse. This issue affects WP SmartPay: from n/a through 2.7.13.
History

Thu, 23 Apr 2026 15:00:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Wed, 01 Apr 2026 23:45:00 +0000

Type Values Removed Values Added
Description Authentication Bypass Using an Alternate Path or Channel vulnerability in ThemesGrove WP SmartPay allows Authentication Abuse. This issue affects WP SmartPay: from n/a through 2.7.13. Authentication Bypass Using an Alternate Path or Channel vulnerability in Convers Lab WP SmartPay smartpay allows Authentication Abuse.This issue affects WP SmartPay: from n/a through <= 2.7.13.
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Fri, 27 Jun 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 27 Jun 2025 12:00:00 +0000

Type Values Removed Values Added
Description Authentication Bypass Using an Alternate Path or Channel vulnerability in ThemesGrove WP SmartPay allows Authentication Abuse. This issue affects WP SmartPay: from n/a through 2.7.13.
Title WordPress WP SmartPay plugin <= 2.7.13 - Account Takeover vulnerability
Weaknesses CWE-288
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T16:11:37.692Z

Reserved: 2025-02-03T13:35:41.375Z

Link: CVE-2025-25171

cve-icon Vulnrichment

Updated: 2025-06-27T14:04:53.624Z

cve-icon NVD

Status : Deferred

Published: 2025-06-27T12:15:31.387

Modified: 2026-04-23T15:25:44.800

Link: CVE-2025-25171

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T01:15:06Z

Weaknesses