HIGHVulnerability
Verified
Global

NVD HIGH: CVE-2026-3124 — The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Objec...

Monday, March 30, 2026 at 02:16 AM UTC·Source: NIST NVD

Updated: Monday, April 6, 2026 at 12:17 AM UTC

Executive Summary

The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.7 via the executePayment() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to complete arbitrary pending orders by exploiting a mismatch between the PayPal transaction token and the local order, allow

Analysis

The Download Monitor plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 5.1.7 via the executePayment() function due to missing validation on a user controlled key. This makes it possible for unauthenticated attackers to complete arbitrary pending orders by exploiting a mismatch between the PayPal transaction token and the local order, allowing theft of paid digital goods by paying a minimal amount for a low-cost item and using that payment token to finalize a high-value order. CVSS Score: 7.5. Published: 2026-03-30T02:16:15.630.

Indicators of Compromise (1)

CVE (1)
CVE-2026-3124
Source Attribution

Originally published by NIST NVD on Mar 30, 2026. Verified by: NIST.

Related Threats