[{"data":1,"prerenderedAt":-1},["ShallowReactive",2],{"$fj5w6JptxEZSE0V4w58gIORnVi0-dP8jePjGDLKOdSw4":3},{"id":4,"url_slug":5,"title":6,"description":7,"plugin_slug":8,"theme_slug":9,"affected_versions":10,"patched_in_version":11,"severity":12,"cvss_score":13,"cvss_vector":14,"vuln_type":15,"published_date":16,"updated_date":17,"references":18,"days_to_patch":20},"CVE-2024-30527","wp-express-checkout-accept-paypal-payments-unauthenticated-price-manipulation","WP Express Checkout (Accept PayPal Payments) \u003C= 2.3.7 - Unauthenticated Price Manipulation","The WP Express Checkout (Accept PayPal Payments) plugin for WordPress is vulnerable to price manipulation in all versions up to, and including, 2.3.7. This is due to insufficient validation on the pricing data being passed to the server. This makes it possible for unauthenticated attackers to modify the price of bookings.","wp-express-checkout",null,"\u003C=2.3.7","2.3.8","medium",5.3,"CVSS:3.1\u002FAV:N\u002FAC:L\u002FPR:N\u002FUI:N\u002FS:U\u002FC:N\u002FI:L\u002FA:N","Use of Less Trusted Source","2024-03-29 00:00:00","2024-04-04 00:37:20",[19],"https:\u002F\u002Fwww.wordfence.com\u002Fthreat-intel\u002Fvulnerabilities\u002Fid\u002F42cd1b53-400f-4933-b3cc-2fd9079e241c?source=api-prod",6]