The WP Stripe Checkout WordPress plugin before 1.2.2.21 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks
{"id": "CVE-2022-3986", "vendorId": null, "type": "cve", "bulletinFamily": "NVD", "title": "CVE-2022-3986", "description": "The WP Stripe Checkout WordPress plugin before 1.2.2.21 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks", "published": "2022-12-19T14:15:00", "modified": "2022-12-22T20:46:00", "cvss": {"score": 0.0, "vector": "NONE"}, "cvss2": {}, "cvss3": {"cvssV3": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "LOW", "userInteraction": "REQUIRED", "scope": "CHANGED", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM"}, "exploitabilityScore": 2.3, "impactScore": 2.7}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2022-3986", "reporter": "contact@wpscan.com", "references": ["https://wpscan.com/vulnerability/ad8077a1-7cbe-4aa1-ad7d-acb41027ed0a"], "cvelist": ["CVE-2022-3986"], "immutableFields": [], "lastseen": "2022-12-22T21:16:52", "viewCount": 14, "enchantments": {"dependencies": {"references": [{"type": "githubexploit", "idList": ["924A2700-DE51-50B5-B888-C8155ED8C4C9"]}, {"type": "patchstack", "idList": ["PATCHSTACK:F5442B83EBD83A635F8D41E2764DDEBE"]}, {"type": "wpexploit", "idList": ["WPEX-ID:AD8077A1-7CBE-4AA1-AD7D-ACB41027ED0A"]}, {"type": "wpvulndb", "idList": ["WPVDB-ID:AD8077A1-7CBE-4AA1-AD7D-ACB41027ED0A"]}]}, "score": {"value": 2.7, "vector": "NONE"}, "affected_software": {"major_version": [{"name": "noorsplugin wp stripe checkout", "version": 1}]}, "vulnersScore": 2.7}, "_state": {"dependencies": 1671743863, "score": 1671743921, "affected_software_major_version": 1671744781}, "_internal": {"score_hash": "209238c5cb714f4eb836f1c615c5b5c2"}, "cna_cvss": {"cna": null, "cvss": {}}, "cpe": [], "cpe23": [], "cwe": ["CWE-79"], "affectedSoftware": [{"cpeName": "noorsplugin:wp_stripe_checkout", "version": "1.2.2.21", "operator": "lt", "name": "noorsplugin wp stripe checkout"}], "affectedConfiguration": [], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"operator": "OR", "children": [], "cpe_match": [{"vulnerable": true, "cpe23Uri": "cpe:2.3:a:noorsplugin:wp_stripe_checkout:1.2.2.21:*:*:*:*:wordpress:*:*", "versionEndExcluding": "1.2.2.21", "cpe_name": []}]}]}, "extraReferences": [{"url": "https://wpscan.com/vulnerability/ad8077a1-7cbe-4aa1-ad7d-acb41027ed0a", "name": "https://wpscan.com/vulnerability/ad8077a1-7cbe-4aa1-ad7d-acb41027ed0a", "refsource": "MISC", "tags": ["Exploit", "Third Party Advisory"]}]}
{"wpvulndb": [{"lastseen": "2022-12-23T02:34:52", "description": "The plugin does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks\n\n### PoC\n\nAs a contributor, put the following shortcode in a page/post [wp_stripe_checkout item_name='test' amount='1' currency='\" onload=alert(/XSS/) \"'] The XSS will be triggered when viewing/previewing the page/post\n", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2022-11-22T00:00:00", "type": "wpvulndb", "title": "WP Stripe Checkout < 1.2.2.21 - Contributor+ Stored XSS", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2022-3986"], "modified": "2022-12-05T15:47:31", "id": "WPVDB-ID:AD8077A1-7CBE-4AA1-AD7D-ACB41027ED0A", "href": "https://wpscan.com/vulnerability/ad8077a1-7cbe-4aa1-ad7d-acb41027ed0a", "sourceData": "", "cvss": {"score": 0.0, "vector": "NONE"}}], "patchstack": [{"lastseen": "2022-11-22T14:54:38", "description": "Auth. Stored Cross-Site Scripting (XSS) vulnerability discovered by Lana Codes in WordPress WP Stripe Checkout plugin (versions <= 1.2.2.20).\n\n## Solution\n\n\r\n Update the WordPress WP Stripe Checkout plugin to the latest available version (at least 1.2.2.21).\r\n ", "cvss3": {}, "published": "2022-11-22T00:00:00", "type": "patchstack", "title": "WordPress WP Stripe Checkout plugin <= 1.2.2.20 - Auth. Stored Cross-Site Scripting (XSS) vulnerability", "bulletinFamily": "software", "cvss2": {}, "cvelist": ["CVE-2022-3986"], "modified": "2022-11-22T00:00:00", "id": "PATCHSTACK:F5442B83EBD83A635F8D41E2764DDEBE", "href": "https://patchstack.com/database/vulnerability/wp-stripe-checkout/wordpress-wp-stripe-checkout-plugin-1-2-2-20-auth-stored-cross-site-scripting-xss-vulnerability", "cvss": {"score": 0.0, "vector": "NONE"}}], "wpexploit": [{"lastseen": "2022-12-23T02:34:52", "description": "The plugin does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks\n", "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "baseScore": 5.4, "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1", "userInteraction": "REQUIRED"}, "impactScore": 2.7}, "published": "2022-11-22T00:00:00", "type": "wpexploit", "title": "WP Stripe Checkout < 1.2.2.21 - Contributor+ Stored XSS", "bulletinFamily": "exploit", "cvss2": {}, "cvelist": ["CVE-2022-3986"], "modified": "2022-12-05T15:47:31", "id": "WPEX-ID:AD8077A1-7CBE-4AA1-AD7D-ACB41027ED0A", "href": "", "sourceData": "As a contributor, put the following shortcode in a page/post\r\n\r\n[wp_stripe_checkout item_name='test' amount='1' currency='\" onload=alert(/XSS/) \"']\r\n\r\nThe XSS will be triggered when viewing/previewing the page/post", "cvss": {"score": 0.0, "vector": "NONE"}}]}