The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.7 via the executePayment() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to complete arbitrary pending orders by exploiting a mismatch between the PayPal transaction token and the local order, allowing theft of paid digital goods by paying a minimal amount for a low-cost item and using that payment token to finalize a high-value order.
References
Configurations
No configuration.
History
No history.
Information
Published : 2026-03-30 02:16
Updated : 2026-03-30 13:26
NVD link : CVE-2026-3124
Mitre link : CVE-2026-3124
CVE.ORG link : CVE-2026-3124
JSON object : View
Products Affected
No product.
CWE
CWE-639
Authorization Bypass Through User-Controlled Key
