We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-30152

Sylius PayPal Plugin has an Order Manipulation Vulnerability after PayPal Checkout



Description

The Syliud PayPal Plugin is the Sylius Core Team’s plugin for the PayPal Commerce Platform. Prior to 1.6.2, 1.7.2, and 2.0.2, a discovered vulnerability allows users to modify their shopping cart after completing the PayPal Checkout process and payment authorization. If a user initiates a PayPal transaction from a product page or the cart page and then returns to the order summary page, they can still manipulate the cart contents before finalizing the order. As a result, the order amount in Sylius may be higher than the amount actually captured by PayPal, leading to a scenario where merchants deliver products or services without full payment. The issue is fixed in versions: 1.6.2, 1.7.2, 2.0.2 and above.

Reserved 2025-03-17 | Published 2025-03-19 | Updated 2025-03-19 | Assigner GitHub_M


MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N

Problem types

CWE-472: External Control of Assumed-Immutable Web Parameter

Product status

< 1.6.2
affected

>= 1.7.0, < 1.7.2
affected

>= 2.0.0, < 2.0.2
affected

References

github.com/...Plugin/security/advisories/GHSA-hxg4-65p5-9w37

github.com/...ommit/5613df827a6d4fc50862229295976200a68e97aa

cve.org (CVE-2025-30152)

nvd.nist.gov (CVE-2025-30152)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-30152

Support options

Helpdesk Chat, Email, Knowledgebase
MonTueWedThuFriSatSun
311234567891011121314151617181920212223242526272829301234567891011
MonTueWedThuFriSatSun
311234567891011121314151617181920212223242526272829301234567891011