CVE-2025-58616

6.5 MEDIUM

📋 TL;DR

CVE-2025-58616 is a missing authorization vulnerability in Frisbii Pay WordPress plugin that allows attackers to bypass access controls and potentially perform unauthorized actions. This affects all Frisbii Pay installations from initial versions through 1.8.2.1. WordPress administrators using this payment gateway plugin are at risk.

💻 Affected Systems

Products:
  • Frisbii Pay (WordPress plugin)
Versions: n/a through 1.8.2.1
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of the affected plugin versions are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers could manipulate payment transactions, access sensitive customer payment data, or modify plugin settings to redirect payments.

🟠

Likely Case

Unauthorized users gain access to administrative functions they shouldn't have, potentially viewing or modifying payment-related data.

🟢

If Mitigated

Proper access controls would limit users to their authorized functions only, preventing unauthorized administrative actions.

🌐 Internet-Facing: HIGH - WordPress plugins are typically internet-facing and accessible via web interfaces.
🏢 Internal Only: LOW - This is primarily an internet-facing web application vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires some understanding of WordPress plugin structure and access control mechanisms.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Versions after 1.8.2.1

Vendor Advisory: https://patchstack.com/database/wordpress/plugin/reepay-checkout-gateway/vulnerability/wordpress-frisbii-pay-plugin-1-8-2-1-broken-access-control-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Frisbii Pay and click 'Update Now' if available. 4. If no update shows, download latest version from WordPress repository. 5. Deactivate old plugin, upload new version, activate.

🔧 Temporary Workarounds

Temporary Plugin Deactivation

WordPress

Disable the vulnerable plugin until patched version is available

wp plugin deactivate frisbii-pay

🧯 If You Can't Patch

  • Disable Frisbii Pay plugin immediately and use alternative payment gateway
  • Implement web application firewall rules to block suspicious access patterns to plugin endpoints

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin → Plugins → Frisbii Pay version. If version is 1.8.2.1 or earlier, you are vulnerable.

Check Version:

wp plugin get frisbii-pay --field=version

Verify Fix Applied:

After update, verify version is higher than 1.8.2.1 in WordPress plugins list.

📡 Detection & Monitoring

Log Indicators:

  • Unusual access to Frisbii Pay admin endpoints by non-admin users
  • Multiple failed authorization attempts followed by successful access

Network Indicators:

  • HTTP requests to /wp-content/plugins/frisbii-pay/ with non-admin user agents performing administrative actions

SIEM Query:

source="wordpress.log" AND ("frisbii-pay" OR "reepay") AND (user_role!="administrator") AND (action="admin" OR action="settings")

🔗 References

📤 Share & Export