Stored Cross-Site Scripting in Payment Page Plugin for WordPress
CVE-2026-0751

6.4MEDIUM

Key Information:

Vendor

WordPress

Vendor
CVE Published:
14 February 2026

What is CVE-2026-0751?

The Payment Page | Payment Form for Stripe plugin for WordPress is susceptible to Stored Cross-Site Scripting through the 'pricing_plan_select_text_font_family' parameter, stemming from poor input sanitization and output escaping practices. This vulnerability enables authenticated attackers with Author-level access or higher to insert arbitrary web scripts. Consequently, when users access pages where these scripts have been injected, the malicious code can execute, potentially compromising sensitive information or user interactions.

Affected Version(s)

Payment Page | Payment Form for Stripe 0 <= 1.4.6

References

CVSS V3.1

Score:
6.4
Severity:
MEDIUM
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Athiwat Tiprasaharn
.