First published: Mon Dec 19 2022(Updated: )
The WP Stripe Checkout WordPress plugin before 1.2.2.21 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks
Credit: contact@wpscan.com
Affected Software | Affected Version | How to fix |
---|---|---|
Noorsplugin Wp Stripe Checkout | <1.2.2.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-3986 has a moderate severity rating due to its potential for Stored Cross-Site Scripting (XSS) attacks.
To fix CVE-2022-3986, update the WP Stripe Checkout WordPress plugin to version 1.2.2.21 or later.
All versions of the WP Stripe Checkout plugin prior to 1.2.2.21 are affected by CVE-2022-3986.
CVE-2022-3986 can be exploited to perform Stored Cross-Site Scripting (XSS) attacks.
Users with a role as low as contributor can potentially exploit CVE-2022-3986.