Stored Cross-Site Scripting Vulnerability in WP Express Checkout for WordPress
CVE-2023-1469

4.8MEDIUM

Key Information:

Vendor
Wordpress
Vendor
CVE Published:
17 March 2023

Summary

The WP Express Checkout plugin for WordPress contains a Stored Cross-Site Scripting vulnerability through the 'pec_coupon[code]' parameter. This flaw arises from inadequate input sanitization and output escaping in versions up to and including 2.2.8. Authenticated attackers with administrator-level access can exploit this vulnerability to inject arbitrary web scripts, which will execute when users access the compromised pages. Furthermore, given the right permissions, lower-privileged users may also be able to exploit this vulnerability if the 'Admin Dashboard Access Permission' setting is configured to allow them dashboard access.

Affected Version(s)

WP Express Checkout (Accept PayPal Payments Easily) 2.2.8

References

CVSS V3.1

Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Ayoub Safa
.