CVE-2022-3983

The Checkout for PayPal WordPress plugin before 1.0.14 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks
Configurations

Configuration 1 (hide)

cpe:2.3:a:noorsplugin:checkout_for_paypal:*:*:*:*:*:wordpress:*:*

History

21 Nov 2024, 07:20

Type Values Removed Values Added
References () https://wpscan.com/vulnerability/0b48bbd6-7c77-44b8-a5d6-34e4a0747cf1 - Exploit, Third Party Advisory () https://wpscan.com/vulnerability/0b48bbd6-7c77-44b8-a5d6-34e4a0747cf1 - Exploit, Third Party Advisory
Summary
  • (es) El complemento de WordPress Checkout for PayPal anterior a 1.0.14 no valida ni escapa algunos de sus atributos de código corto antes de devolverlos a la página, lo que podría permitir a los usuarios con un rol tan bajo como el de colaborador realizar ataques de cross site scripting almacenado.

Information

Published : 2022-12-19 14:15

Updated : 2025-04-17 14:15


NVD link : CVE-2022-3983

Mitre link : CVE-2022-3983

CVE.ORG link : CVE-2022-3983


JSON object : View

Products Affected

noorsplugin

  • checkout_for_paypal
CWE

No CWE.