CVE-2021-41120: Sylius PayPal Plugin allows unauthorized access to Credit card form, exposing payer name and not requiring 3DS
7.5
CVSS Score
3.1
Basic Information
CVE ID
GHSA ID
EPSS Score
0.57876%
CWE
Published
10/6/2021
Updated
1/27/2023
KEV Status
No
Technology
PHP
Technical Details
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
sylius/paypal-plugin | composer | >= 1.0.0, < 1.2.4 | 1.2.4 |
sylius/paypal-plugin | composer | >= 1.3.0, < 1.3.1 | 1.3.1 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
- The payment form route used predictable IDs without order token validation (Authorization Bypass via CWE-639), fixed by adding dual-parameter lookup in PayWithPayPalFormAction. 2. The Twig template's JavaScript integration lacked 3DS enforcement and result validation, allowing unauthenticated payments and PII exposure through prefilled names, addressed by adding contingencies parameter and authentication checks in the patch.