Description
The Paypal Donation Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'paypal' shortcode in all versions up to, and including, 0.1. This is due to the plugin not properly sanitizing user input and output of the 'title' and 'text' parameters. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-11
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Update Plugin
AI Analysis

Impact

The Paypal Donation Shortcode plugin stored user‑supplied content from the 'title' and 'text' parameters into posts without proper sanitization, allowing an attacker who can author or edit content to inject executable JavaScript. When a victim opens a page that contains the injected shortcode, the code runs with the visitor’s browser context, enabling theft of session cookies, credential phishing, or defacement. This flaw corresponds to CWE‑79, a classic stored XSS vulnerability.

Affected Systems

The vulnerability affects all WordPress installations running versions of the coenjacobs:Paypal Donation Shortcode plugin up to and including 0.1. Users of the plugin, whether as site admins or contributors with write access, are at risk if they have not updated beyond 0.1.

Risk and Exploitability

The flaw carries a CVSS score of 6.4, placing it in the medium–high range, and has an EPSS score of less than 1 %, indicating a low but non‑zero likelihood of exploitation in the wild. The exploit requires authenticated contributors or higher with permissions to insert or edit posts, making it a privilege‑based attack. The vulnerability is not listed in the CISA KEV database, and no public exploitation campaigns have been reported.

Generated by OpenCVE AI on April 21, 2026 at 01:44 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Paypal Donation Shortcode plugin to the latest version that contains the sanitization fix.
  • If an update is unavailable, remove the plugin entirely or restrict its use to administrators only, preventing contributors from adding the vulnerable shortcode.
  • As an interim patch, apply a custom sanitization filter to the 'title' and 'text' attributes to escape HTML before storage, thereby mitigating the XSS vector.

Generated by OpenCVE AI on April 21, 2026 at 01:44 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 12 Nov 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 12 Nov 2025 13:00:00 +0000

Type Values Removed Values Added
First Time appeared Coenjacobs
Coenjacobs paypal Donation Shortcode
Wordpress
Wordpress wordpress
Vendors & Products Coenjacobs
Coenjacobs paypal Donation Shortcode
Wordpress
Wordpress wordpress

Tue, 11 Nov 2025 03:45:00 +0000

Type Values Removed Values Added
Description The Paypal Donation Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'paypal' shortcode in all versions up to, and including, 0.1. This is due to the plugin not properly sanitizing user input and output of the 'title' and 'text' parameters. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Paypal Donation Shortcode <= 0.1 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Coenjacobs Paypal Donation Shortcode
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:17:25.448Z

Reserved: 2025-10-16T13:21:23.210Z

Link: CVE-2025-11859

cve-icon Vulnrichment

Updated: 2025-11-12T15:12:06.448Z

cve-icon NVD

Status : Deferred

Published: 2025-11-11T04:15:43.103

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11859

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T01:45:24Z

Weaknesses