Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3hwm-4538-x9g2

Опубликовано: 25 апр. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 5.3

Описание

The Upsell Funnel Builder for WooCommerce plugin for WordPress is vulnerable to order manipulation in all versions up to, and including, 3.0.0. This is due to the plugin allowing the additional product ID and discount field to be manipulated prior to processing via the 'add_offer_in_cart' function. This makes it possible for unauthenticated attackers to arbitrarily update the product associated with any order bump, and arbitrarily update the discount applied to any order bump item, when adding it to the cart.

The Upsell Funnel Builder for WooCommerce plugin for WordPress is vulnerable to order manipulation in all versions up to, and including, 3.0.0. This is due to the plugin allowing the additional product ID and discount field to be manipulated prior to processing via the 'add_offer_in_cart' function. This makes it possible for unauthenticated attackers to arbitrarily update the product associated with any order bump, and arbitrarily update the discount applied to any order bump item, when adding it to the cart.

EPSS

Процентиль: 57%
0.00347
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-472

Связанные уязвимости

CVSS3: 5.3
nvd
10 месяцев назад

The Upsell Funnel Builder for WooCommerce plugin for WordPress is vulnerable to order manipulation in all versions up to, and including, 3.0.0. This is due to the plugin allowing the additional product ID and discount field to be manipulated prior to processing via the 'add_offer_in_cart' function. This makes it possible for unauthenticated attackers to arbitrarily update the product associated with any order bump, and arbitrarily update the discount applied to any order bump item, when adding it to the cart.

EPSS

Процентиль: 57%
0.00347
Низкий

5.3 Medium

CVSS3

Дефекты

CWE-472