Impact
MetForm Pro, a WordPress plugin, has an improper input validation flaw affecting all releases up to 3.9.7. The flaw allows attackers to manipulate the payment amount by submitting a crafted 'mf-calculation' field in a form REST request. As a result, unauthenticated attackers can trigger transactions for amounts of their choosing, potentially causing financial loss and fraud.
Affected Systems
The vulnerability impacts the Wpmet MetForm Pro plugin versions up to and including 3.9.7. The issue exists only when a form is configured with the specific payment integration settings that trust the 'mf-calculation' field.
Risk and Exploitability
The CVSS score is 5.3, indicating medium severity. EPSS data is not available, and the vulnerability is not listed in the KEV catalog. Attackers must be able to submit a form that includes the vulnerable configuration, but the attack is unauthenticated and can be performed remotely via the REST endpoint. Because the flaw requires a particular form setup, the exploitable surface is limited but still presents a realistic risk in sites that use the vulnerable plugin configuration.
OpenCVE Enrichment