First published: Sat Jun 03 2023(Updated: )
The Event Registration Calendar By vcita plugin, versions up to and including 3.9.1, and Online Payments – Get Paid with PayPal, Square & Stripe plugin, for WordPress are vulnerable to Stored Cross-Site Scripting via the 'email' parameter in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with the edit_posts capability, such as contributors and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Credit: security@wordfence.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vcita CRM and Lead Management | <=3.9.1 | |
Online Payments Get Paid with PayPal, Square & Stripe | <=1.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-2406 is a vulnerability in the Event Registration Calendar By vcita and Online Payments – Get Paid with PayPal, Square & Stripe plugins for WordPress that allows for Stored Cross-Site Scripting.
The severity of CVE-2023-2406 is medium with a CVSS score of 5.4.
CVE-2023-2406 occurs due to insufficient input validation in the 'email' parameter of the affected plugins.
Versions up to and including 3.9.1 of the Event Registration Calendar By vcita plugin and versions up to and including 1.3.1 of the Online Payments – Get Paid with PayPal, Square & Stripe plugin for WordPress are affected by CVE-2023-2406.
Update the Event Registration Calendar By vcita plugin to version 3.9.2 or later, and update the Online Payments – Get Paid with PayPal, Square & Stripe plugin to version 1.3.2 or later to fix CVE-2023-2406.