Parameter Tampering in WooCommerce PayPal Checkout Payment Gateway Plugin by WordPress
CVE-2019-14979

5.3MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
29 August 2019

Summary

The WooCommerce PayPal Checkout Payment Gateway plugin version 1.6.17 for WordPress has a vulnerability that allows an attacker to manipulate the payment amount via the URL parameters, specifically using the cmd=_cart method. This manipulation may enable a purchase to be made at a lower price than intended. Although the plugin includes validation against the WooCommerce order total at checkout, any discrepancies leave the order in an 'On Hold' state, posing a risk for unfulfilled transactions and potential financial loss.

References

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.