![]() ![]() I don’t know what version of OpenCart you have but here is a link that discussed that event, and a potential quick fix for you. ![]() Both PayPal and OpenCart alerted people at the time, but obviously many years have passed since then. Essentially at the checkout page, the buyer can open a HTML coding path and change the amount of the product. We contacted PP and this was the response:īack in 2015, PayPal was alerted of a vulnerability that affect OpenCart v1.5 carts. It was still on the back of the couriers van. ![]() Great! Then a routine check of our PP account we discovered the buyer had only paid PP $23 for the $1000 item WTF? Fortunately we hadn't sent it. Apparently in 2015 PayPal sent out an alert of a issue with PayPal Standard on OpenCart 1.5 but I must have missed the memo We have been using PP standard for nearly 10 years without an issue (we hope).Ī couple of days ago we had a $1000 sale on our 2.3.0.2 site though PP standard. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |