cve/2024/CVE-2024-30527.md

18 lines
839 B
Markdown
Raw Normal View History

2025-09-29 21:09:30 +02:00
### [CVE-2024-30527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30527)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Express%20Checkout%20(Accept%20PayPal%20Payments)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input&color=brightgreen)
### Description
Improper Validation of Specified Quantity in Input vulnerability in Tips and Tricks HQ WP Express Checkout (Accept PayPal Payments) allows Manipulating Hidden Fields.This issue affects WP Express Checkout (Accept PayPal Payments): from n/a through 2.3.7.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates