The Claudio Sanches – Checkout Cielo for WooCommerce plugin for WordPress is vulnerable to unauthorized modification of data due to insufficient payment validation in the update_order_status() function in all versions up to, and including, 1.1.0. This makes it possible for unauthenticated attackers to update the status of orders to paid bypassing payment.
References
Configurations
No configuration.
History
08 Apr 2026, 18:20
| Type | Values Removed | Values Added |
|---|---|---|
| CWE | CWE-345 |
21 Nov 2024, 08:51
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://plugins.trac.wordpress.org/browser/woocommerce-checkout-cielo/trunk/includes/class-wc-checkout-cielo-gateway.php#L296 - | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/40cb3214-a11b-4bee-9422-256d12303460?source=cve - |
04 Jun 2024, 16:57
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
04 Jun 2024, 06:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-06-04 06:15
Updated : 2026-04-15 00:35
NVD link : CVE-2024-1718
Mitre link : CVE-2024-1718
CVE.ORG link : CVE-2024-1718
JSON object : View
Products Affected
No product.
CWE
CWE-345
Insufficient Verification of Data Authenticity
