CVE-2023-7287

5.4 MEDIUM

📋 TL;DR

This vulnerability allows authenticated WordPress users with subscriber-level permissions to cancel subscriptions managed by the Paytium plugin. It affects WordPress sites using Paytium versions 4.3.7 and earlier. The issue stems from missing authorization checks in the subscription cancellation function.

💻 Affected Systems

Products:
  • Paytium: Mollie payment forms & donations plugin for WordPress
Versions: Up to and including 4.3.7
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Requires WordPress installation with Paytium plugin and at least one authenticated user with subscriber role.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could systematically cancel all subscriptions, causing significant revenue loss and disrupting recurring payment services.

🟠

Likely Case

Malicious subscribers cancel their own or others' subscriptions, leading to payment processing issues and customer service overhead.

🟢

If Mitigated

With proper user role management and monitoring, impact is limited to isolated subscription cancellations that can be quickly restored.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but is technically simple once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 4.3.8

Vendor Advisory: https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=2853869%40paytium%2Ftrunk&old=2824314%40paytium%2Ftrunk&sfp_email=&sfph_mail=#file0

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Paytium plugin and click 'Update Now'. 4. Verify version is 4.3.8 or higher.

🔧 Temporary Workarounds

Temporarily disable subscription functionality

all

Disable Paytium subscription features until patched

Restrict subscriber capabilities

all

Use WordPress role management to remove plugin-related capabilities from subscriber role

🧯 If You Can't Patch

  • Implement strict user role management and audit subscriber accounts
  • Monitor subscription cancellation logs and implement alerting for unusual patterns

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Installed Plugins → Paytium version. If version ≤4.3.7, vulnerable.

Check Version:

wp plugin list --name=paytium --field=version

Verify Fix Applied:

Verify Paytium version is 4.3.8 or higher in WordPress admin panel.

📡 Detection & Monitoring

Log Indicators:

  • Multiple subscription cancellation requests from subscriber-level users
  • Unusual pt_cancel_subscription function calls

Network Indicators:

  • POST requests to /wp-admin/admin-ajax.php with action=pt_cancel_subscription

SIEM Query:

source="wordpress.log" AND "pt_cancel_subscription" AND user_role="subscriber"

🔗 References

📤 Share & Export