First published: Tue Jan 21 2025(Updated: )
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in vcita.com Online Payments – Get Paid with PayPal, Square & Stripe allows Stored XSS. This issue affects Online Payments – Get Paid with PayPal, Square & Stripe: from n/a through 3.20.0.
Credit: audit@patchstack.com
Affected Software | Affected Version | How to fix |
---|---|---|
Online Payments Get Paid with PayPal, Square & Stripe | <=3.20.0 | |
WordPress Online Payments plugin | <=3.20.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-22661 is classified as a high severity vulnerability due to its potential for stored cross-site scripting (XSS).
To fix CVE-2025-22661, update vcita Online Payments or WordPress Online Payments plugin to version 3.20.1 or later.
CVE-2025-22661 affects vcita Online Payments and WordPress Online Payments plugin up to version 3.20.0.
CVE-2025-22661 involves an improper neutralization of input during web page generation, specifically leading to a stored XSS vulnerability.
Yes, CVE-2025-22661 can potentially allow attackers to execute malicious scripts, compromising user data and session information.