Stored Cross-Site Scripting in Payment Page Plugin for WordPress
CVE-2026-0751

6.4MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
14 February 2026

What is CVE-2026-0751?

The Payment Page | Payment Form for Stripe plugin for WordPress is susceptible to Stored Cross-Site Scripting through the 'pricing_plan_select_text_font_family' parameter, stemming from poor input sanitization and output escaping practices. This vulnerability enables authenticated attackers with Author-level access or higher to insert arbitrary web scripts. Consequently, when users access pages where these scripts have been injected, the malicious code can execute, potentially compromising sensitive information or user interactions.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

Payment Page | Payment Form for Stripe * <= 1.4.6

References

CVSS V3.1

Score:
6.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Athiwat Tiprasaharn
.