[Security-news] Commerce Eurobank (Redirect) - Moderately critical - Access bypass - SA-CONTRIB-2025-066

security-news at drupal.org security-news at drupal.org
Wed May 21 17:28:48 UTC 2025


View online: https://www.drupal.org/sa-contrib-2025-066

Project: Commerce Eurobank (Redirect) [1]
Date: 2025-May-21
Security risk: *Moderately critical* 13 ∕ 25
AC:Basic/A:None/CI:None/II:Some/E:Theoretical/TD:All [2]
Vulnerability: Access bypass

Affected versions: <2.1.1
CVE IDs: CVE-2025-48445
Description: 
This module enables you to pay for Commerce order to an environment provided
and secured by the bank

The module doesn't sufficiently verify the payment status on canceled orders.
An attacker can issue a specially crafted request to update the order status
to completed.

Solution: 
Install the latest version:

  * If you use the commerce_eurobank_redirect module for Drupal 8.x, upgrade
    to commerce_eurobank_redirect 2.1.1 [3]

Reported By: 
  * Marios Tsalkidis (silios) [4]

Fixed By: 
  * Bill Seremetis (bserem) [5]
  * Panagiotis Moutsopoulos (vensires) [6]

Coordinated By: 
  * Greg Knaddison (greggles) [7] of the Drupal Security Team
  * Juraj Nemec (poker10) [8] of the Drupal Security Team


[1] https://www.drupal.org/project/commerce_eurobank_redirect
[2] https://www.drupal.org/security-team/risk-levels
[3] https://www.drupal.org/project/commerce_eurobank_redirect/releases/2.1.1
[4] https://www.drupal.org/u/silios
[5] https://www.drupal.org/u/bserem
[6] https://www.drupal.org/u/vensires
[7] https://www.drupal.org/u/greggles
[8] https://www.drupal.org/u/poker10



More information about the Security-news mailing list