CWE
79
Advisory Published
Updated

CVE-2023-1469: XSS

First published: Fri Mar 17 2023(Updated: )

The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrator-level access to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: This can potentially be exploited by lower-privileged users if the `Admin Dashboard Access Permission` setting it set for those users to access the dashboard.

Credit: security@wordfence.com

Affected SoftwareAffected VersionHow to fix
Tipsandtricks-hq Wp Express Checkout<2.2.9

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2023-1469?

    CVE-2023-1469 is a vulnerability in the WP Express Checkout plugin for WordPress that allows for Stored Cross-Site Scripting attacks.

  • What is the severity of CVE-2023-1469?

    The severity of CVE-2023-1469 is medium with a score of 4.8.

  • How does CVE-2023-1469 affect the WP Express Checkout plugin?

    CVE-2023-1469 affects versions up to and including 2.2.8 of the WP Express Checkout plugin for WordPress.

  • How can CVE-2023-1469 be exploited?

    CVE-2023-1469 can be exploited by authenticated attackers with administrator-level access through the 'pec_coupon[code]' parameter.

  • Is there a fix available for CVE-2023-1469?

    Yes, the fix for CVE-2023-1469 is to update to version 2.2.9 or later of the WP Express Checkout plugin.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203