Unauthorized Modification of Data in Checkout Cielo Plugin Due to Insufficient Payment Validation

CVE-2024-1718
5.3MEDIUM

Key Information

Vendor
ClaudiOSanches
Status
Claudio Sanches – Checkout Cielo For WooCommerce
Vendor
CVE Published:
4 June 2024

Summary

The Claudio Sanches – Checkout Cielo for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to insufficient payment validation in the update_order_status() function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to update the status of orders to paid bypassing payment.

Affected Version(s)

Claudio Sanches – Checkout Cielo for WooCommerce <= 1.1.0

CVSS V3.1

Score:
5.3
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published.

  • Disclosed

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database

Credit

Lucio Sá
.