Parameter Tampering in WooCommerce PayPal Checkout Payment Gateway by WordPress
CVE-2019-7441

6.5MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
21 March 2019

Summary

The WooCommerce PayPal Checkout Payment Gateway version 1.6.8 for WordPress is susceptible to parameter tampering, particularly with the 'amount' parameter during transactions. This vulnerability allows a malicious user to modify the pricing of purchases, potentially enabling them to buy products for less than the intended price. Although the plugin validates the amount against the actual WooCommerce order total, discrepancies can leave orders in an 'On Hold' state if the manipulated amount does not align. Website owners using this plugin should ensure they keep their installation updated and monitor any transactions for suspicious activity.

References

CVSS V3.1

Score:
6.5
Severity:
MEDIUM
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.