BugForge - Daily - Cheesy Does It (Repeat)
BugForge - Daily - Cheesy Does It (Repeat)
Daily - Cheesy Does It (Repeat)
This is a repeat of the daily challenge from January 19th, 2026.
Vulnerability Overview
A Business Logic Flaw exists in the checkout process where the backend accepts client-supplied discount data without enforcing strict validation or business rules. Although individual discount codes are validated, the application fails to handle array-based input correctly, allowing an attacker to submit multiple discount codes in a single request and receive cumulative discounts. This results in unauthorized price reductions, potential financial loss, and abuse of promotional mechanisms - highlighting weak server-side enforcement of pricing logic and over-trust in client-controlled request structures.
Key Issues:
- The backend accepts array-based input for the discount code parameter without normalization
- Individual discount codes are validated, but multiple codes can be stacked via array injection
- Business rules limiting discount usage are not enforced server-side
Vulnerabilities Covered
- Business Logic Flaw
- Type Confusion (Array Injection)
Classification
- OWASP Top 10: A01:2021 - Broken Access Control
- Vulnerability Type: Business Logic Flaw / Array Injection
- Attack Surface: Checkout and order processing API
- CWE: CWE-840 - Business Logic Errors
This post is licensed under CC BY 4.0 by the author.
