First published: Sun Jul 17 2022(Updated: )
The Accept Stripe Payments WordPress plugin before 2.0.64 does not sanitize and escape some of its settings, allowing high privilege users such as admin to perform cross-Site Scripting attacks even when the unfiltered_html capability is disallowed.
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tipsandtricks-hq Accept Stripe | <2.0.64 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2022-2194.
The severity of CVE-2022-2194 is medium.
The affected software of CVE-2022-2194 is the Accept Stripe Payments WordPress plugin before version 2.0.64.
CVE-2022-2194 allows high privilege users to perform cross-site scripting attacks even when the unfiltered_html capability is disallowed.
Yes, upgrading to version 2.0.64 or later of the Accept Stripe Payments WordPress plugin fixes CVE-2022-2194.