Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
cgi-bin/webscr?cmd=_cart in the WooCommerce PayPal Checkout Payment Gateway plugin 1.6.8 for WordPress allows Parameter Tampering in an amount parameter (such as amount_1), as demonstrated by purchasing an item for lower than the intended price. NOTE: The plugin author states it is true that the amount can be manipulated in the PayPal payment flow. However, the amount is validated against the WooCommerce order total before completing the order, and if it doesn’t match then the order will be left in an “On Hold” state
CVSS Information
N/A
Vulnerability Type
N/A
Vulnerability Title
WordPress WooCommerce PayPal Checkout Payment Gateway插件输入验证错误漏洞
Vulnerability Description
WordPress是WordPress基金会的一套使用PHP语言开发的博客平台。该平台支持在PHP和MySQL的服务器上架设个人博客网站。WooCommerce PayPal Checkout Payment Gateway是使用在其中的一个PayPal支付网关插件。 WordPress WooCommerce PayPal Checkout Payment Gateway插件1.6.8版本中的cgi-bin/webscr?cmd=_cart存在输入验证错误漏洞。攻击者可借助‘amount’参数利用该漏洞
CVSS Information
N/A
Vulnerability Type
N/A