First published: Mon Dec 19 2022(Updated: )
The Checkout for PayPal WordPress plugin before 1.0.14 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
PayPal Checkout | <1.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3983 is assessed as a high-severity vulnerability due to its potential to allow stored cross-site scripting attacks.
To fix CVE-2022-3983, update the Checkout for PayPal WordPress plugin to version 1.0.14 or later.
Users of the Checkout for PayPal WordPress plugin prior to version 1.0.14 are affected by CVE-2022-3983.
CVE-2022-3983 is a stored cross-site scripting (XSS) vulnerability that affects input validation.
Yes, users with a contributor role can exploit CVE-2022-3983 due to insufficient validation and escaping of shortcode attributes.