CVE-2026-3124
The Download Monitor plugin for WordPress has a vulnerability that allows attackers to exploit a mismatch between PayPal transaction tokens and local orders, enabling them to steal paid digital goods by paying for a low-cost item and using that payment token to finalize a high-value order. This is due to missing validation on a user-controlled key in the executePayment() function. Attackers can complete arbitrary pending orders without authentication.
Developers using the Download Monitor plugin for WordPress are at high risk of allowing unauthenticated attackers to steal paid digital goods, posing a significant financial threat to their business.
AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
0
Affected Products
2
References
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
Exploitability
Impact