In the ChristmasDinner::changeParticipationStatus function, there is no validation to check whether a participant has made a payment. This may allow attackers to change their status to a participant without making any payment, impacting the contract's fairness and fund security.
The ChristmasDinner::changeParticipationStatus function changes participation status based solely on the current state and time without verifying whether balances[msg.sender][token] is greater than zero, meaning it does not validate whether the user has made a payment. The function lacks logic to verify the payment status of users, allowing attackers to call this function and change their status to participant without making any actual payment.
Abuse of Participation Privileges
Attackers can bypass the payment requirement to become a participant and gain access to privileges or resources without contributing any funds.
Financial Loss
If the contract contains logic to allocate funds or benefits to participant members, it may result in a loss of benefits for actual contributors.
System Integrity Damage
This vulnerability undermines the fairness and credibility of the contract, reducing user trust and affecting community participation.
Manual review.
Add payment validation logic to the changeParticipationStatus function to ensure that only users who have made a payment can change their status to participant.
The contest is live. Earn rewards by submitting a finding.
This is your time to appeal against judgements on your submissions.
Appeals are being carefully reviewed by our judges.