CVE-2025-7820
SKT PayPal for WooCommerce <= 1.4 - Unauthenticated Payment Bypass
highClient-Side Enforcement of Server-Side Security
7.5
CVSS Score
7.5
CVSS Score
high
Severity
1.5
Patched in
1d
Time to patch
Description
The SKT PayPal for WooCommerce plugin for WordPress is vulnerable to Payment Bypass in all versions up to, and including, 1.4. This is due to the plugin only enforcing client side controls instead of server-side controls when processing payments. This makes it possible for unauthenticated attackers to make confirmed purchases without actually paying for them.
CVSS Vector Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:NAttack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
None
Confidentiality
High
Integrity
None
Availability
Technical Details
Affected versions
<=1.4PublishedNovember 26, 2025
Last updatedNovember 27, 2025
Affected pluginskt-paypal-for-woocommerce
Check if your site is affected.
Run a free security audit to detect vulnerable plugins, outdated versions, and misconfigurations.