The Quick Paypal Payments WordPress plugin before 5.7.26.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)
References
Link | Resource |
---|---|
https://wpscan.com/vulnerability/0d247a3d-154e-4da7-a147-c1c7e1b5e87e | Exploit Third Party Advisory |
https://wpscan.com/vulnerability/0d247a3d-154e-4da7-a147-c1c7e1b5e87e | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 07:39
Type | Values Removed | Values Added |
---|---|---|
References | () https://wpscan.com/vulnerability/0d247a3d-154e-4da7-a147-c1c7e1b5e87e - Exploit, Third Party Advisory |
07 Nov 2023, 04:04
Type | Values Removed | Values Added |
---|---|---|
CWE |
Information
Published : 2023-05-02 08:15
Updated : 2024-11-21 07:39
NVD link : CVE-2023-1554
Mitre link : CVE-2023-1554
CVE.ORG link : CVE-2023-1554
JSON object : View
Products Affected
fullworksplugins
- quick_paypal_payments
CWE
No CWE.