CVE-2023-23941
Summary
| CVE | CVE-2023-23941 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2023-02-03 21:15:00 UTC |
| Updated | 2023-02-15 15:56:00 UTC |
| Description | SwagPayPal is a PayPal integration for shopware/platform. If JavaScript-based PayPal checkout methods are used (PayPal Plus, Smart Payment Buttons, SEPA, Pay Later, Venmo, Credit card), the amount and item list sent to PayPal may not be identical to the one in the created order. The problem has been fixed with version 5.4.4. As a workaround, disable the aforementioned payment methods or use the Security Plugin in version >= 1.0.21. |
Risk And Classification
Problem Types: NVD-CWE-noinfo
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Shopware | Swagpaypal | All | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Update changelog · shopware/SwagPayPal@57db5f4 · GitHub | MISC | github.com | |
| Payment information sent to PayPal not necessarily identical to created order · Advisory · shopware/SwagPayPal · GitHub | MISC | github.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.