PT-2026-37299 · Packagist · Wwbn Avideo
Published
2026-05-05
·
Updated
2026-05-05
·
CVE-2026-43883
CVSS v3.1
4.2
Medium
| Vector | AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:L |
Summary
plugin/PayPalYPT/agreementCancel.json.php cancels a PayPal billing agreement using an attacker-supplied agreement parameter without verifying that the authenticated user owns the agreement. A low-privilege authenticated user who learns or obtains another user's PayPal billing agreement ID can silently suspend the victim's recurring subscription, causing revenue loss to the platform and loss of paid service to the victim.Details
AVideo's PayPalYPT plugin ships two near-duplicate endpoints that cancel a PayPal billing agreement. Only one of them enforces ownership:
plugin/PayPalYPT/PayPalAgreementCancel.json.php:19— correctly requires either admin or the agreement's owner:
if (!User::isAdmin() && !Subscription::isAgreementFromUser($ POST['agreement id'], User::getId())) {
$obj->msg = "Only the owner can delete his agreement";
die(json encode($obj));
}
plugin/PayPalYPT/agreementCancel.json.php:9-26— only checksUser::isLogged()(in fact twice, redundantly) and then calls the cancellation directly:
if (!User::isLogged()) { ... die; } // line 9
if (empty($ REQUEST['agreement'])) { ... die; } // line 14
if (!User::isLogged()) { ... die; } // line 19 — duplicate; no ownership check
$plugin = AVideoPlugin::loadPluginIfEnabled("PayPalYPT");
$agreement = PayPalYPT::cancelAgreement($ REQUEST['agreement']); // line 26
PayPalYPT::cancelAgreement() at plugin/PayPalYPT/PayPalYPT.php:548-566 resolves the agreement ID against PayPal and calls $createdAgreement->suspend($agreementStateDescriptor, $apiContext) unconditionally — the server does not verify that the logged-in user's users id matches the owner recorded in PayPalYPT log (or wherever the agreement was registered):public static function cancelAgreement($agreement id)
{
...
$createdAgreement = self::getBillingAgreement($agreement id);
try {
$createdAgreement->suspend($agreementStateDescriptor, $apiContext);
return Agreement::get($createdAgreement->getId(), $apiContext);
} catch (Exception $ex) {
return false;
}
}
The intended UI caller is
subscriptions list.php:84 which posts the current user's own agreement IDs — but the server accepts any agreement parameter from any logged-in user. Agreement IDs can leak via error log entries written in agreementCancel.json.php:34 and webhook.php during normal operation, via PayPal receipt emails, or via other administrative and payment-log screens. No CSRF token is required, but the root defect is missing authorization, not CSRF.PoC
- Log in as any low-privilege user (registered subscriber, commenter, free-tier account created via
signUp). - Obtain the target's PayPal agreement ID (e.g.,
I-ABCD1234XYZ). This may come from server error logs, email receipts, admin/payment screens, or other disclosures. - Send the request with the victim's agreement ID:
curl -X POST 'https://target.example/plugin/PayPalYPT/agreementCancel.json.php'
-b 'PHPSESSID=<attacker session>'
-d 'agreement=I-ABCD1234XYZ'
- Expected response:
{"error":false,"msg":""}
The victim's billing agreement is suspended at PayPal via
Agreement::suspend() (PayPalYPT.php:560). The victim stops being billed; AVideo subsequently reflects the subscription as inactive.Impact
- Any authenticated user can silently cancel another user's active PayPal recurring billing agreement.
- Revenue disruption for the platform operator — any affected subscribers stop being billed.
- Service disruption for the victim — their paid subscription lapses.
- The defect is purely an authorization gap; the sister endpoint
PayPalAgreementCancel.json.phpdemonstrates that the owner/admin check was intentional for this action but was not applied to this duplicate.
Recommended Fix
Port the ownership check from the sister endpoint into
agreementCancel.json.php:if (!User::isAdmin() && !Subscription::isAgreementFromUser($ REQUEST['agreement'], User::getId())) {
$obj->msg = "Only the owner can cancel this agreement";
die(json encode($obj));
}
Alternative, preferred remediation: delete the duplicate
agreementCancel.json.php entirely and point the cancelAgreement() JS helper in subscriptions list.php:84 at the already-protected PayPalAgreementCancel.json.php endpoint (sending the expected agreement id POST field). While patching, also remove the redundant second User::isLogged() branch at line 19.Fix
IDOR
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Wwbn Avideo