CVE-2023-1469
Published on: Not Yet Published
Last Modified on: 03/17/2023 03:44:00 PM UTC
Certain versions of WP Express Checkout Accept PayPal Payments Easily from Mra13 contain the following vulnerability:
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrator-level access to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: This can potentially be exploited by lower-privileged users if the `Admin Dashboard Access Permission` setting it set for those users to access the dashboard.
- CVE-2023-1469 has been assigned by
[email protected] to track the vulnerability
- Affected Vendor/Software:
mra13 - WP Express Checkout (Accept PayPal Payments Easily) version = 2.2.8
CVE References
Description | Tags ⓘ | Link |
---|---|---|
403 Forbidden | plugins.trac.wordpress.org text/html Inactive LinkNot Archived |
![]() |
WP Express Checkout <= 2.2.8 - Authenticated (Admin+) Stored Cross-Site Scripting via pec_coupon[code] | www.wordfence.com text/html |
![]() |
Known Affected Software
Vendor | Product | Version |
---|---|---|
Mra13 | WP_Express_Checkout_Accept_PayPal_Payments_Easily | = 2.2.8 |
Social Mentions
Source | Title | Posted (UTC) |
---|---|---|
![]() |
CVE-2023-1469 : The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘… twitter.com/i/web/status/1… | 2023-03-17 13:04:40 |
![]() |
CVE-2023-1469 | 2023-03-17 14:38:05 |