cve/2022/CVE-2022-3986.md

18 lines
815 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2022-3986](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3986)
![](https://img.shields.io/static/v1?label=Product&message=WP%20Stripe%20Checkout&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3D%200%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-79%20Cross-Site%20Scripting%20(XSS)&color=brighgreen)
### Description
The WP Stripe Checkout WordPress plugin before 1.2.2.21 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks
### POC
#### Reference
- https://wpscan.com/vulnerability/ad8077a1-7cbe-4aa1-ad7d-acb41027ed0a
#### Github
No PoCs found on GitHub currently.