Vulnerabilities and security researches forcheckout-for-paypal checkout-for-paypal
Direction: ascendingJun 07, 2024
Checkout for PayPal # CVE-2022-3983
- CVE, Research URL
- Home page URL
- Application
- Date
- Dec 19, 2022
- Research Description
- The Checkout for PayPal WordPress plugin before 1.0.14 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Jan 18, 2025
Checkout for PayPal # CVE-2024-13398
- CVE, Research URL
- Home page URL
- Application
- Date
- Jan 17, 2025
- Research Description
- The Checkout for PayPal plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'checkout_for_paypal' shortcode in all versions up to, and including, 1.0.32 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable
Apr 18, 2025
Checkout for PayPal # CVE-2025-39572
- CVE, Research URL
- Home page URL
- Application
- Date
- Apr 16, 2025
- Research Description
- Checkout for PayPal [checkout-for-paypal] < 1.0.39 CVE-2025-39572 [en] Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Noor Alam Checkout for PayPal allows Stored XSS. This issue affects Checkout for PayPal: from n/a through 1.0.38.
- Affected versions
-
Min -, max -.
- Status
-
vulnerable