CVE-2024-11895

The Online Payments – Get Paid with PayPal, Square & Stripe plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 3.20.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Configurations

Configuration 1 (hide)

cpe:2.3:a:vcita:online_payments_-_get_paid_with_paypal\,_square_\&_stripe:*:*:*:*:*:wordpress:*:*

History

21 Feb 2025, 15:36

Type Values Removed Values Added
CPE cpe:2.3:a:vcita:online_payments_-_get_paid_with_paypal\,_square_\&_stripe:*:*:*:*:*:wordpress:*:*
First Time Vcita online Payments - Get Paid With Paypal\, Square \& Stripe
Vcita
CVSS v2 : unknown
v3 : 6.4
v2 : unknown
v3 : 5.4
References () https://www.wordfence.com/threat-intel/vulnerabilities/id/aab33299-f02d-44a1-9522-5309eed6fd38?source=cve - () https://www.wordfence.com/threat-intel/vulnerabilities/id/aab33299-f02d-44a1-9522-5309eed6fd38?source=cve - Third Party Advisory
References () https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L50 - () https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L50 - Product
References () https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L129 - () https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L129 - Product
References () https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L91 - () https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L91 - Product
References () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3241650%40paypal-payment-button-by-vcita&new=3241650%40paypal-payment-button-by-vcita&sfp_email=&sfph_mail= - () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3241650%40paypal-payment-button-by-vcita&new=3241650%40paypal-payment-button-by-vcita&sfp_email=&sfph_mail= - Patch
References () https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L22 - () https://plugins.trac.wordpress.org/browser/paypal-payment-button-by-vcita/tags/3.10.0/core/shortcodes.php#L22 - Product

18 Feb 2025, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-18 08:15

Updated : 2025-02-21 15:36


NVD link : CVE-2024-11895

Mitre link : CVE-2024-11895


JSON object : View

Products Affected

vcita

  • online_payments_-_get_paid_with_paypal\,_square_\&_stripe
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')