All termsSecurityUpdated April 10, 2026

What Is CVV?

CVV (Card Verification Value) is a 3- or 4-digit security code printed on payment cards. It proves the buyer has physical possession of the card during card-not-present transactions, reducing fraud without storing sensitive data.

Also known as: CVV2, CVC, CSC, CID

Key Takeaways

  • CVV proves physical card possession, reducing card-not-present fraud at authorization.
  • PCI DSS Requirement 3.2 strictly prohibits storing CVV codes after a transaction is authorized.
  • CVV checks alone are insufficient — layer them with 3D Secure and AVS for comprehensive protection.
  • Dynamic CVVs rotate every 30–60 minutes, making intercepted codes worthless to fraudsters.
  • Requiring CVV at checkout can reduce fraud-related chargebacks by 15–26% for card-not-present merchants.

How CVV Works

The CVV is generated by the card issuer at the time of card manufacturing using a cryptographic algorithm that combines the primary account number (PAN), the card's expiry date, and a secret key held by the issuer. The resulting code is printed — never embossed — on the physical card. During an online transaction, the customer supplies this code alongside their card number, and the issuer validates it in real time as part of the authorization flow.

01

Customer enters card details at checkout

The cardholder provides the card number, expiry date, and CVV in the payment form. The CVV field is typically rendered as a short, separate input — sometimes hosted directly by the payment gateway — to prevent the value from touching merchant servers.

02

Gateway transmits CVV to the acquiring bank

The payment gateway packages the CVV alongside the full authorization request and forwards it through the card network (Visa, Mastercard, Amex, Discover) to the card-issuing bank. At this stage, the merchant's infrastructure should not log or persist the value.

03

Issuer validates the CVV cryptographically

The issuer's host system recomputes the expected CVV using the same algorithm and secret key used when the card was manufactured. If the supplied code matches the expected value, the check passes and the issuer proceeds to evaluate the full authorization request.

04

Issuer returns a CVV response code

The authorization response includes a CVV result indicator: M (match), N (no match), P (not processed), S (should be present but not supplied), or U (issuer not certified for CVV). Gateways and fraud engines use these codes to accept, decline, or flag the transaction for review.

05

CVV is purged after authorization

Once authorization completes, PCI DSS requires that the CVV be deleted from all systems — application logs, databases, and temporary files. The merchant may retain the authorization code and a payment token, but the raw CVV value must not persist anywhere in the stack.

Why CVV Matters

Card-not-present fraud is the dominant form of payment fraud in markets where EMV chip adoption has displaced in-person counterfeiting. CVV acts as a lightweight, zero-friction line of defense at the authorization stage, before any goods ship or services are rendered, requiring no additional cardholder action.

According to the Nilson Report, card-not-present fraud accounted for over 75% of all card fraud losses in the United States in recent years, surpassing $9 billion annually. Requiring CVV at checkout has been demonstrated to reduce fraud-related chargebacks by 15–26% for ecommerce merchants, based on program data published by Visa and Mastercard's risk management divisions. A single CVV-related data breach can trigger mass card reissuance costs averaging $5–$15 per card — expenses that card networks can ultimately charge back to non-compliant merchants.

CVV verification is also a direct compliance trigger. Merchants who collect CVV and fail to purge it after authorization face PCI DSS Requirement 3.2 violations, which are among the most commonly cited findings in PCI forensic investigations following a breach.

CVV and authorization rates

Issuers that enforce strict CVV validation approve a higher share of legitimate transactions because genuine cardholders almost never enter an incorrect CVV (mismatch rates under 1% for real customers). Enabling CVV checks rarely hurts conversion for authentic buyers while filtering a meaningful share of fraudulent attempts before authorization.

CVV vs. 3D Secure

CVV and 3D Secure are complementary fraud controls that operate at different points in the authentication stack, not interchangeable alternatives. Understanding when each applies is essential for building a layered defense without creating unnecessary customer friction.

DimensionCVV3D Secure (3DS2)
Who validatesCard issuer (automated)Issuer + cardholder (interactive)
User frictionNone — silent checkLow to none; OTP/biometric on high-risk transactions
Liability shiftNoYes — issuer assumes chargeback liability on authenticated transactions
What it provesPhysical card possessionCardholder identity
When triggeredEvery card-not-present transactionRisk-based or merchant-mandated
PSD2 / SCA scopeNot sufficient aloneQualifies as a Strong Customer Authentication factor
Primary defeat vectorPhishing, data breachSIM-swap, account takeover

For merchants operating in the EU or UK, CVV alone does not satisfy Strong Customer Authentication requirements under PSD2. A full 3DS2 challenge flow is required for SCA-mandated transactions, though CVV validation typically occurs in parallel as an additional signal to the issuer's fraud scoring engine.

Types of CVV

Several distinct CVV variants exist across different card form factors and transaction types. Each has different security properties, and understanding them helps merchants configure validation rules correctly.

CVV1 is encoded in Track 2 of the magnetic stripe. It is verified during in-person, card-present swipe transactions and is never visible on the card surface. A stolen card number alone cannot reconstruct CVV1, but a skimmed magnetic stripe does contain it, which is why stripe-based fraud persists in markets with lower EMV adoption.

CVV2 is the printed code used for card-not-present transactions online or by phone. Because it is not encoded in the magnetic stripe, standard skimmers cannot capture it. This is the code ecommerce merchants collect at checkout.

iCVV (Integrated Circuit Card Verification Value) is used in EMV chip transactions. The chip generates a unique iCVV per transaction using a session counter, making replay attacks impossible even if a terminal is compromised.

dCVV (Dynamic CVV) is offered by select issuers via cards with a small e-ink display. The visible code rotates every 30–60 minutes, meaning intercepted codes expire before they can be exploited. Some virtual card products rotate the CVV on every transaction, providing similar protection in a digital context.

Best Practices

CVV handling is a shared responsibility between business stakeholders who configure payment rules and developers who build and maintain the checkout and authorization stack. Gaps at either layer create compliance exposure and fraud risk.

For Merchants

  • Always require CVV for card-not-present transactions. Removing the CVV field to reduce checkout friction measurably increases fraud and chargeback rates for most merchant categories.
  • Configure CVV mismatch rules explicitly in your gateway or fraud engine. A hard decline on an "N" response is appropriate for most transaction types; high-value or instantly fulfilled digital goods warrant an additional step-up challenge even on a match.
  • Combine CVV with Address Verification Service. Matching both CVV and billing postal code substantially reduces domestic card fraud. Neither check alone is as effective as the combination.
  • Review CVV response codes independently of authorization outcomes. Some issuers approve transactions despite a CVV mismatch if their own fraud model permits it. Track CVV codes separately so you can identify and act on issuer opt-out behavior.
  • Train support staff never to request CVV values over email, chat, or phone. Fraudsters impersonating customer support to extract CVV codes is a documented social engineering vector.

For Developers

  • Never log CVV values. Payment forms that route CVV through application servers must verify that no logging middleware captures request bodies. Use gateway-hosted fields or iFrames to keep CVV off your infrastructure entirely.
  • Implement tokenization so subsequent card-on-file charges use a network token rather than the raw PAN and CVV. This eliminates CVV storage risk for subscription and marketplace platforms while maintaining high authorization rates.
  • Audit session replay and analytics tools. Tools like session recorders can inadvertently capture CVV inputs unless fields are explicitly excluded. Verify your analytics stack is scoped out of PCI DSS sensitive data before go-live.
  • Apply client-side masking. Render CVV inputs as password fields and clear the value from memory immediately after the authorization request is dispatched.
  • Test all CVV response code paths. Most sandbox environments provide test card numbers to simulate match, mismatch, not-processed, and issuer-not-certified responses. Ensure your integration handles all codes gracefully, not just binary approve or decline.

Common Mistakes

Even experienced payment teams make avoidable errors in CVV handling. These are the most frequently cited issues in PCI forensic investigations and post-breach reviews.

1. Storing CVV in application logs or databases after authorization. This is the most common PCI Requirement 3.2 violation. Request logging middleware, database audit trails, error reporting tools, and analytics pipelines are all potential retention vectors. Every system that touches an authorization request must be reviewed.

2. Treating a CVV match as proof of transaction legitimacy. A CVV match confirms the code is correct — it does not confirm the cardholder authorized the purchase. Fraudsters who obtain card data via phishing typically capture CVV alongside the PAN. Always layer CVV results with fraud prevention signals such as device fingerprinting, IP velocity, and behavioral scoring.

3. Skipping CVV on the initial authorization for recurring subscriptions. Card network rules permit omitting CVV on subsequent recurring charges for stored credentials, but the initial transaction should always include CVV. Omitting it on the first charge removes a key fraud signal at the highest-risk moment in the customer lifecycle.

4. Ignoring CVV mismatches on low-value transactions. Some merchants configure their fraud rules to suppress CVV mismatch declines below a threshold amount. Carding attackers exploit this directly by probing with micro-transactions before escalating to high-value purchases once a valid card is confirmed.

5. Treating all non-match CVV codes as equivalent. An "N" (mismatch) is categorically different from a "U" (issuer not certified). Declining on "U" will incorrectly block legitimate customers of issuers that do not participate in CVV validation. Rules must distinguish between these codes and handle each appropriately.

CVV and Tagada

Tagada's payment orchestration layer centralizes CVV policy enforcement across every gateway and processor in your routing stack, eliminating the need to configure mismatch rules separately in each provider's dashboard.

Consistent CVV rules across failover routes

When Tagada reroutes a transaction to a backup processor during a primary gateway outage, CVV response codes are preserved and evaluated through the same orchestration logic. Your fraud rules apply uniformly regardless of which processor settles the payment — no CVV policy gaps during failover or smart routing decisions.

Tagada integrates with network tokenization schemes so card-on-file transactions use issuer-issued tokens rather than raw PANs and CVVs. For subscription merchants and marketplace platforms, this removes CVV storage risk entirely while improving authorization rates through issuer-preferred token routing — a meaningful advantage over direct gateway integrations that require merchants to manage raw card data and associated PCI scope themselves.

Frequently Asked Questions

What is a CVV and where is it found?

CVV stands for Card Verification Value. It is a 3-digit code printed on the back of Visa, Mastercard, and Discover cards inside the signature strip, and a 4-digit code printed on the front of American Express cards. The code is not embossed and is not encoded in the magnetic stripe, meaning a standard card skimmer cannot capture it. Its purpose is to verify that a customer making an online or phone purchase has physical access to the card at the time of the transaction.

Is it legal or safe to store CVV numbers?

No. PCI DSS Requirement 3.2 explicitly prohibits any merchant, processor, or service provider from storing CVV after a transaction has been authorized. This applies even if the data is encrypted. Storing CVV is a compliance violation that can result in significant fines, mandatory card reissuance costs charged back to the merchant, and loss of card acceptance rights. Merchants handling card-on-file transactions should use tokenization instead of storing raw card details.

What happens when a CVV check fails?

When a CVV check fails, the card issuer returns a mismatch response code (typically 'N'). Most payment gateways are configured to automatically decline transactions with a CVV mismatch. Merchants can also apply custom rules — for example, routing mismatched transactions to a manual review queue or triggering a 3D Secure step-up challenge. Repeated CVV failures from the same IP address or device fingerprint are a strong carding signal and should trigger velocity-based blocking.

Does CVV prevent all card fraud?

No, CVV is a meaningful but incomplete fraud control. It is effective against fraudsters who have card numbers obtained from data breaches but not the physical card. However, attackers who obtain card data through phishing or social engineering often capture CVV alongside the PAN and expiry date. For comprehensive protection, merchants should layer CVV checks with Address Verification Service, 3D Secure authentication, device fingerprinting, and behavioral velocity rules.

What is the difference between CVV1 and CVV2?

CVV1 is encoded in Track 2 of a card's magnetic stripe and is verified during in-person swipe transactions at a point-of-sale terminal. It is never visible on the card surface. CVV2 is the printed code used for card-not-present transactions online or by phone. Because CVV2 is not stored in the magnetic stripe, a skimmer cannot capture it. EMV chip cards additionally generate a unique iCVV per chip transaction, which cannot be replayed even if a terminal is compromised.

Do digital wallets like Apple Pay or Google Pay use CVV?

Digital wallets do not transmit the printed CVV. Instead, they use tokenization and a dynamic transaction cryptogram generated uniquely for each payment — functionally equivalent to a one-time CVV that cannot be replayed. This makes wallet-based payments more secure than manually keying in card details. For this reason, many issuers waive CVV requirements for tokenized wallet transactions and apply separate risk scoring to them.

Tagada Platform

CVV — built into Tagada

See how Tagada handles cvv as part of its unified commerce infrastructure. One platform for payments, checkout, and growth.