CVE-2026-8738
Description
A security vulnerability has been detected in Sanluan PublicCMS 5.202506.d. Impacted is the function TradeOrderController.pay/TradePaymentController.pay/AccountGatewayComponent.pay of the file publiccms-trade/src/main/java/com/publiccms/controller/web/trade/TradeOrderController.java of the component Trade Payment Flow. The manipulation leads to business logic errors. Remote exploitation of the attack is possible. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Unauthenticated attackers can force payment of any pending order using the victim's internal account balance in PublicCMS 5.202506.d.
Vulnerability
A business logic flaw exists in the PublicCMS trade payment flow in version 5.202506.d. The TradeOrderController.pay() method accepts orderId and accountType without verifying authentication or order ownership. It creates an internal balance payment record for the specified order, redirecting to TradePaymentController.pay(), which also lacks authentication checks. The AccountGatewayComponent.pay() then deducts funds from the victim's internal account. Affected files include publiccms-trade/src/main/java/com/publiccms/controller/web/trade/TradeOrderController.java and related payment logic [1].
Exploitation
An unauthenticated attacker can send a request to /tradeOrder/pay with a victim's orderId and accountType=account. The application proceeds without requiring authentication, creating a payment record for the victim's order. The request is redirected to /tradePayment/pay, which again does not verify the requester's identity, directly invoking the account gateway to deduct funds from the victim's internal balance. No session, token, or CSRF credentials are needed [1].
Impact
Successful exploitation forces a victim's pending order to be paid using their internal account balance, resulting in unauthorized financial loss for the victim. The attacker gains the ability to trigger payment without holding a valid session or ownership of the order [1].
Mitigation
The vendor was contacted but did not respond, and no official patch has been released. As a workaround, implement authentication and authorization checks on the affected endpoints to ensure the requester is the order owner. Alternatively, disable the /tradeOrder/pay and /tradePayment/pay endpoints if not required [1].
AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.