First published: Fri Jul 26 2024(Updated: )
In the module "PayPal Official" for PrestaShop 7+ releases prior to version 6.4.2 and for PrestaShop 1.6 releases prior to version 3.18.1, a malicious customer can confirm an order even if payment is finally declined by PayPal. A logical weakness during the capture of a payment in case of disabled webhooks can be exploited to create an accepted order. This could allow a threat actor to confirm an order with a fraudulent payment support. Versions 6.4.2 and 3.18.1 contain a patch for the issue. Additionally, users enable webhooks and check they are callable.
Credit: security-advisories@github.com
Affected Software | Affected Version | How to fix |
---|---|---|
PayPal Official Module for PrestaShop | <6.4.2 | |
Prestashop | <3.18.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-41670 has been classified as a critical vulnerability due to its potential impact on transaction integrity.
To resolve CVE-2024-41670, upgrade the PayPal Official Module for PrestaShop to version 6.4.2 or later and PrestaShop to version 3.18.1 or later.
CVE-2024-41670 affects users of the PayPal Official Module for PrestaShop versions prior to 6.4.2 and PrestaShop versions prior to 3.18.1.
CVE-2024-41670 exploits a logical weakness during the payment capture process, allowing orders to be confirmed despite payment being declined.
There are no recommended workarounds for CVE-2024-41670; upgrading to fixed versions is the best approach.