Description
Improper Verification of Cryptographic Signature vulnerability in Drupal Drupal Commerce Paybox Commerce Paybox on Drupal 7.X allows Authentication Bypass.This issue affects Drupal Commerce Paybox: from 7-x-1.0 through 7.X-1.5.
Published: 2026-01-28
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Authentication Bypass (payment processing)
Action: Patch Now
AI Analysis

Impact

Improper verification of a cryptographic signature in Drupal Commerce Paybox allows an attacker to forge payment requests and bypass the authentication controls that normally ensure that only legitimate users can submit transactions. This flaw is classified under CWE-347. The result is that an unauthenticated or unauthorized user can create or modify payment orders without the platform detecting the tampering, potentially causing unauthorized funds to be processed or legitimate funds to be diverted.

Affected Systems

The issue affects Drupal Commerce Paybox 7-x-1.0 through 7.X-1.5, which is a module that extends Drupal 7 for e‑commerce transactions. The product is supplied by Verifone and is listed in the CPE catalog as verifone:commerce_paybox. Any installation of the affected module versions on a Drupal 7 site is vulnerable.

Risk and Exploitability

The CVSS score of 8.7 indicates a high severity risk. The EPSS score is under 1 %, suggesting low exploitation probability at present, and the flaw is not currently listed in the CISA Known Exploited Vulnerabilities catalog. The most likely attack vector is via the web interface that accepts signed payment data; an attacker would need to obtain a valid cryptographic signature or forge one, but because the signature is not checked correctly, malicious requests can still reach the payment processing logic. If an attacker can construct such requests, the payment bypass can be performed without needing further privileges.

Generated by OpenCVE AI on April 18, 2026 at 01:41 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade Drupal Commerce Paybox to the latest supported release that fixes the signature verification bug.
  • Restrict access to the payment submission endpoint, ensuring only authenticated users with appropriate permissions can reach it.
  • Implement proper cryptographic signature verification for all payment requests to prevent the bypass.
  • Continuously monitor transaction logs for anomalous activity and conduct regular audits of e‑commerce operations.

Generated by OpenCVE AI on April 18, 2026 at 01:41 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 09 Mar 2026 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Verifone
Verifone commerce Paybox
CPEs cpe:2.3:a:verifone:commerce_paybox:*:*:*:*:*:drupal:*:*
Vendors & Products Verifone
Verifone commerce Paybox
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N'}


Thu, 29 Jan 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Drupal
Drupal drupal Commerce Paybox
Vendors & Products Drupal
Drupal drupal Commerce Paybox

Wed, 28 Jan 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Description Improper Verification of Cryptographic Signature vulnerability in Drupal Drupal Commerce Paybox Commerce Paybox on Drupal 7.X allows Authentication Bypass.This issue affects Drupal Commerce Paybox: from 7-x-1.0 through 7.X-1.5.
Title Payment bypass in Commerce Paybox
Weaknesses CWE-347
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:N'}


Subscriptions

Drupal Drupal Commerce Paybox
Verifone Commerce Paybox
cve-icon MITRE

Status: PUBLISHED

Assigner: drupal

Published:

Updated: 2026-01-28T19:25:29.820Z

Reserved: 2026-01-08T19:51:40.852Z

Link: CVE-2026-0750

cve-icon Vulnrichment

Updated: 2026-01-28T19:25:20.505Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-28T19:16:24.620

Modified: 2026-03-09T14:38:54.277

Link: CVE-2026-0750

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T01:45:33Z

Weaknesses