vulnerability
WordPress Plugin: wp-express-checkout: CVE-2023-1469: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
3 | (AV:N/AC:H/Au:M/C:P/I:P/A:N) | Mar 17, 2023 | May 15, 2025 | May 15, 2025 |
Severity
3
CVSS
(AV:N/AC:H/Au:M/C:P/I:P/A:N)
Published
Mar 17, 2023
Added
May 15, 2025
Modified
May 15, 2025
Description
The WP Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘pec_coupon[code]’ parameter in versions up to, and including, 2.2.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers with administrator-level access to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: This can potentially be exploited by lower-privileged users if the `Admin Dashboard Access Permission` setting it set for those users to access the dashboard.
Solution
wp-express-checkout-plugin-cve-2023-1469

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.