Impact
A vulnerability in Sanluan PublicCMS versions 4.0/5.0/6.0 allows attackers to manipulate the paymentId argument in the Paid method of the TradePaymentService, bypassing authorization checks. The flaw enables unauthorized execution of payment operations and can lead to unwanted financial transactions. This improper authorization is the core impact of the vulnerability.
Affected Systems
Affected systems include the Sanluan PublicCMS product, specifically the Trade Payment Handler component located in publiccms-parent/publiccms-trade/src/main/java/com/publiccms/logic/service/trade/TradePaymentService.java. The issue exists in all releases up to 4.0.202506.d, 5.202506.d, and 6.202506.d.
Risk and Exploitability
The CVSS score of 2.3 signals a low severity, and the EPSS <1% indicates an extremely low exploitation probability. The vulnerability is not listed in CISA KEV. Attackers can initiate the exploit remotely by submitting crafted requests that alter paymentId; the attack complexity is high and exploitation is difficult, which reduces the likelihood of widespread impact.
OpenCVE Enrichment