Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2022-43312 | The Checkout for PayPal WordPress plugin before 1.0.14 does not validate and escape some of its shortcode attributes before outputting them back in the page, which could allow users with a role as low as contributor to perform Stored Cross-Site Scripting attacks |
Thu, 17 Apr 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: WPScan
Published:
Updated: 2025-04-17T13:46:12.292Z
Reserved: 2022-11-14T10:23:03.163Z
Link: CVE-2022-3983
Updated: 2024-08-03T01:27:54.098Z
Status : Modified
Published: 2022-12-19T14:15:11.183
Modified: 2025-04-17T14:15:20.467
Link: CVE-2022-3983
No data.
OpenCVE Enrichment
No data.
No weakness.
EUVD