| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-wvr6-395c-5pxr | CediPay Affected by Improper Input Validation in Payment Processing |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 20 Feb 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Xpertforextradeinc
Xpertforextradeinc cedipay |
|
| Vendors & Products |
Xpertforextradeinc
Xpertforextradeinc cedipay |
Fri, 20 Feb 2026 01:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 19 Feb 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | CediPay is a crypto-to-fiat app for the Ghanaian market. A vulnerability in CediPay prior to version 1.2.3 allows attackers to bypass input validation in the transaction API. The issue has been fixed in version 1.2.3. If upgrading is not immediately possible, restrict API access to trusted networks or IP ranges; enforce strict input validation at the application layer; and/or monitor transaction logs for anomalies or suspicious activity. These mitigations reduce exposure but do not fully eliminate the vulnerability. | |
| Title | CediPay Affected by Improper Input Validation in Payment Processing | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV4_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-02-19T21:23:44.840Z
Reserved: 2026-02-10T18:01:31.900Z
Link: CVE-2026-26063
Updated: 2026-02-19T20:58:47.679Z
Status : Awaiting Analysis
Published: 2026-02-19T20:25:41.910
Modified: 2026-02-20T13:49:47.623
Link: CVE-2026-26063
No data.
OpenCVE Enrichment
Updated: 2026-02-20T10:05:53Z
Github GHSA