First published: Wed Dec 27 2017(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the (1) cp_updateMessageItem and (2) cp_deleteMessageItem functions in cp_ppp_admin_int_message_list.inc.php in the Payment Form for PayPal Pro plugin before 1.0.2 for WordPress allow remote attackers to inject arbitrary web script or HTML via the cal parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
WordPress Payment Form for PayPal Pro | <=1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-7666 has a medium severity level due to its potential for cross-site scripting attacks.
To fix CVE-2015-7666, update the Payment Form for PayPal Pro plugin to version 1.0.2 or later.
CVE-2015-7666 allows remote attackers to perform cross-site scripting (XSS) attacks, injecting arbitrary web scripts or HTML.
CVE-2015-7666 affects the Payment Form for PayPal Pro plugin versions prior to 1.0.2.
More information about CVE-2015-7666 can typically be found in security advisory databases or by searching for the CVE identifier.