Stored Cross-Site Scripting Vulnerability in WP Express Checkout for WordPress
CVE-2023-1469
4.8MEDIUM
Key Information:
- Vendor
- Wordpress
- Vendor
- CVE Published:
- 17 March 2023
Summary
The WP Express Checkout plugin for WordPress contains a Stored Cross-Site Scripting vulnerability through the 'pec_coupon[code]' parameter. This flaw arises from inadequate input sanitization and output escaping in versions up to and including 2.2.8. Authenticated attackers with administrator-level access can exploit this vulnerability to inject arbitrary web scripts, which will execute when users access the compromised pages. Furthermore, given the right permissions, lower-privileged users may also be able to exploit this vulnerability if the 'Admin Dashboard Access Permission' setting is configured to allow them dashboard access.
Affected Version(s)
WP Express Checkout (Accept PayPal Payments Easily) 2.2.8
References
CVSS V3.1
Score:
4.8
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Ayoub Safa