cve/2024/CVE-2024-30527.md
2025-09-29 21:09:30 +02:00

18 lines
839 B
Markdown

### [CVE-2024-30527](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-30527)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Express%20Checkout%20(Accept%20PayPal%20Payments)&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-1284%20Improper%20Validation%20of%20Specified%20Quantity%20in%20Input&color=brightgreen)
### Description
Improper Validation of Specified Quantity in Input vulnerability in Tips and Tricks HQ WP Express Checkout (Accept PayPal Payments) allows Manipulating Hidden Fields.This issue affects WP Express Checkout (Accept PayPal Payments): from n/a through 2.3.7.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/20142995/nuclei-templates