Lucene search

K
cveWordfenceCVE-2024-1718
HistoryJun 04, 2024 - 6:15 a.m.

CVE-2024-1718

2024-06-0406:15:09
Wordfence
web.nvd.nist.gov
18
cve 2024 1718 security vulnerability

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

7.1

Confidence

Low

EPSS

0.001

Percentile

17.0%

The Claudio Sanches – Checkout Cielo for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to insufficient payment validation in the update_order_status() function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to update the status of orders to paid bypassing payment.

Affected configurations

Vulners
Node
claudiosanchesclaudio_sanches_–_checkout_cielo_for_woocommerceRange1.1.0wordpress
VendorProductVersionCPE
claudiosanchesclaudio_sanches_–_checkout_cielo_for_woocommerce*cpe:2.3:a:claudiosanches:claudio_sanches_–_checkout_cielo_for_woocommerce:*:*:*:*:*:wordpress:*:*

CNA Affected

[
  {
    "vendor": "claudiosanches",
    "product": "Claudio Sanches – Checkout Cielo for WooCommerce",
    "versions": [
      {
        "version": "*",
        "status": "affected",
        "lessThanOrEqual": "1.1.0",
        "versionType": "semver"
      }
    ],
    "defaultStatus": "unaffected"
  }
]

CVSS3

5.3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

AI Score

7.1

Confidence

Low

EPSS

0.001

Percentile

17.0%