First published: Fri Dec 15 2023(Updated: )
A vulnerability has been identified in microweber where users can purchase items with a coupon code. If the admin disables the use of the coupon code functionality, but the user sends requests to the API that handles the coupon code, the user can exploit the vulnerability and obtain items at a lower price.
Credit: security@huntr.dev
Affected Software | Affected Version | How to fix |
---|---|---|
composer/microweber/microweber | <2.0.0 | 2.0.0 |
Microweber WHMCS | <2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6832 has been classified with a moderate severity level due to potential unauthorized coupon code exploitation.
To fix CVE-2023-6832, ensure that you upgrade to a patched version of Microweber above version 2.0.0.
CVE-2023-6832 affects all versions of Microweber prior to 2.0.0 where coupon code functionality is enabled.
CVE-2023-6832 compromises the coupon code functionality allowing unauthorized users to exploit the API to purchase items.
A temporary workaround for CVE-2023-6832 is to ensure that the coupon code functionality is completely disabled in the application settings until an upgrade is performed.