vulnerability
WordPress Plugin: wp-stripe-checkout: CVE-2023-52143: Storage of Sensitive Data in a Mechanism without Access Control
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 8 | (AV:N/AC:L/Au:N/C:C/I:N/A:N) | Dec 28, 2023 | May 15, 2025 | Apr 29, 2026 |
Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
Dec 28, 2023
Added
May 15, 2025
Modified
Apr 29, 2026
Description
The WP Stripe Checkout plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 1.2.2.37 via the debug log file. This makes it possible for unauthenticated attackers to extract sensitive data including stripe checkout debug information.
Solution
wp-stripe-checkout-plugin-cve-2023-52143
References
- https://www.cve.org/CVERecord?id=CVE-2023-52143
- https://www.wordfence.com/threat-intel/vulnerabilities/id/3f244b8e-94ae-4d95-83a7-53b826e98656?source=api-prod
- https://euvd.enisa.europa.eu/vulnerability/EUVD-2023-56816
- CVE-2023-52143
- https://attackerkb.com/topics/CVE-2023-52143
- CWE-532
- EUVD-EUVD-2023-56816
Rapid7 Labs
2026 Global Threat Landscape Report
The predictive window has collapsed. Exploitation follows disclosure in days. See how attackers are accelerating and how to stay ahead.