CVE-2024-0631

The Duitku Payment Gateway plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the check_duitku_response function in all versions up to, and including, 2.11.4. This makes it possible for unauthenticated attackers to change the payment status of orders to failed.
Configurations

Configuration 1 (hide)

cpe:2.3:a:duitku:duitku_payment_gateway:*:*:*:*:*:wordpress:*:*

History

07 Feb 2025, 19:32

Type Values Removed Values Added
CPE cpe:2.3:a:duitku:duitku_payment_gateway:*:*:*:*:*:wordpress:*:*
CWE NVD-CWE-noinfo
First Time Duitku
Duitku duitku Payment Gateway
References () https://plugins.trac.wordpress.org/browser/duitku-social-payment-gateway/trunk/woocommerce-gateway-duitku.php#L409 - () https://plugins.trac.wordpress.org/browser/duitku-social-payment-gateway/trunk/woocommerce-gateway-duitku.php#L409 - Product
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/a33de35f-1c9d-4fc9-9be8-0a1c7d9352ec?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/a33de35f-1c9d-4fc9-9be8-0a1c7d9352ec?source=cve - Third Party Advisory

Information

Published : 2024-03-13 16:15

Updated : 2025-02-07 19:32


NVD link : CVE-2024-0631

Mitre link : CVE-2024-0631

CVE.ORG link : CVE-2024-0631


JSON object : View

Products Affected

duitku

  • duitku_payment_gateway