Parameter Tampering in WooCommerce PayPal Checkout Payment Gateway by WordPress
CVE-2019-7441
Key Information:
- Vendor
Wordpress
- Vendor
- CVE Published:
- 21 March 2019
What is CVE-2019-7441?
The WooCommerce PayPal Checkout Payment Gateway version 1.6.8 for WordPress is susceptible to parameter tampering, particularly with the 'amount' parameter during transactions. This vulnerability allows a malicious user to modify the pricing of purchases, potentially enabling them to buy products for less than the intended price. Although the plugin validates the amount against the actual WooCommerce order total, discrepancies can leave orders in an 'On Hold' state if the manipulated amount does not align. Website owners using this plugin should ensure they keep their installation updated and monitor any transactions for suspicious activity.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.
Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved