CVE-2024-1718

The Claudio Sanches – Checkout Cielo for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to insufficient payment validation in the update_order_status() function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to update the status of orders to paid bypassing payment.
Configurations

No configuration.

History

08 Apr 2026, 18:20

Type Values Removed Values Added
CWE CWE-345

21 Nov 2024, 08:51

Type Values Removed Values Added
References () https://plugins.trac.wordpress.org/browser/woocommerce-checkout-cielo/trunk/includes/class-wc-checkout-cielo-gateway.php#L296 - () https://plugins.trac.wordpress.org/browser/woocommerce-checkout-cielo/trunk/includes/class-wc-checkout-cielo-gateway.php#L296 -
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/40cb3214-a11b-4bee-9422-256d12303460?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/40cb3214-a11b-4bee-9422-256d12303460?source=cve -

04 Jun 2024, 16:57

Type Values Removed Values Added
Summary
  • (es) El complemento Claudio Sanches – Checkout Cielo para WooCommerce para WordPress es vulnerable a modificaciones no autorizadas de datos debido a una validación de pago insuficiente en la función update_order_status() en todas las versiones hasta la 1.1.0 incluida. Esto hace posible que atacantes no autenticados actualicen el estado de los pedidos a pagados sin pasar por el pago.

04 Jun 2024, 06:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-04 06:15

Updated : 2026-04-15 00:35


NVD link : CVE-2024-1718

Mitre link : CVE-2024-1718

CVE.ORG link : CVE-2024-1718


JSON object : View

Products Affected

No product.

CWE
CWE-345

Insufficient Verification of Data Authenticity