CVE-2024-0619

The Payflex Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the payment_callback() function in all versions up to, and including, 2.5.0. This makes it possible for unauthenticated attackers to update the status of orders, which can potentially lead to revenue loss.
Configurations

Configuration 1 (hide)

cpe:2.3:a:payflex:payment_gateway:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 08:47

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/payflex-payment-gateway/trunk/partpay.php#L751 - Product () https://plugins.trac.wordpress.org/browser/payflex-payment-gateway/trunk/partpay.php#L751 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/9f740cfa-7163-4634-9705-0e01ee571a11?source=cve - Third Party Advisory () https://www.wordfence.com/threat-intel/vulnerabilities/id/9f740cfa-7163-4634-9705-0e01ee571a11?source=cve - Third Party Advisory

12 Jul 2024, 17:03

Type Values Removed Values Added
CPE cpe:2.3:a:payflex:payment_gateway:*:*:*:*:*:wordpress:*:*
CWE CWE-862
References () https://plugins.trac.wordpress.org/browser/payflex-payment-gateway/trunk/partpay.php#L751 - () https://plugins.trac.wordpress.org/browser/payflex-payment-gateway/trunk/partpay.php#L751 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/9f740cfa-7163-4634-9705-0e01ee571a11?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/9f740cfa-7163-4634-9705-0e01ee571a11?source=cve - Third Party Advisory
First Time Payflex
Payflex payment Gateway

11 Jul 2024, 13:05

Type Values Removed Values Added
New CVE

Information

Published : 2024-07-11 04:15

Updated : 2024-11-21 08:47


NVD link : CVE-2024-0619

Mitre link : CVE-2024-0619

CVE.ORG link : CVE-2024-0619


JSON object : View

Products Affected

payflex

  • payment_gateway
CWE
CWE-862

Missing Authorization