Miggo Logo

CVE-2025-29788:
Sylius PayPal Plugin Payment Amount Manipulation Vulnerability

6.5

CVSS Score

Basic Information

EPSS Score
-
Published
3/17/2025
Updated
3/17/2025
KEV Status
No
Technology
TechnologyPHP

Technical Details

CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
sylius/paypal-plugincomposer< 1.6.11.6.1
sylius/paypal-plugincomposer>= 1.7.0, < 1.7.11.7.1
sylius/paypal-plugincomposer>= 2.0.0, < 2.0.12.0.1

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from three key flaws: 1) CaptureAction's failure to persist payment amounts for later verification 2) ProcessPayPalOrderAction's lack of real-time amount validation during order processing 3) CompletePayPalOrderFromPaymentPageAction's missing final amount check. The patches introduced PaymentAmountVerifier and added 'payment_amount' storage in CaptureAction, confirming these were the vulnerable points. The CWE-472 mapping (external parameter control) aligns with the unvalidated payment amount parameters from PayPal.

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

* vuln*r**ility *llows us*rs to m*nipul*t* t** *in*l p*ym*nt *mount pro**ss** *y P*yP*l. I* * us*r mo*i*i*s t** it*m qu*ntity in t**ir s*oppin* **rt **t*r initi*tin* t** P*yP*l ****kout pro**ss, P*yP*l will not r***iv* t** up**t** tot*l *mount. *s *

Reasoning

T** vuln*r**ility st*mm** *rom t*r** k*y *l*ws: *) **ptur***tion's **ilur* to p*rsist p*ym*nt *mounts *or l*t*r v*ri*i**tion *) Pro**ssP*yP*lOr**r**tion's l**k o* r**l-tim* *mount v*li**tion *urin* or**r pro**ssin* *) *ompl*t*P*yP*lOr**r*romP*ym*ntP*