Description
The Saphali LiqPay for donate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'saphali_liqpay' shortcode in all versions up to, and including, 1.0.2. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-08
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Immediately
AI Analysis

Impact

The Saphali LiqPay for donate WordPress plugin contains a stored cross‑site scripting (CWE-79) flaw that allows authenticated contributors and higher roles to embed malicious scripts through the "saphali_liqpay" shortcode by supplying unsanitized attributes. Once injected, the script persists and executes on every page that includes the shortcode, potentially stealing session data, hijacking users or defacing content.

Affected Systems

WordPress sites running the Saphali LiqPay for donate plugin up to and including version 1.0.2 are affected. Any site that uses the "saphali_liqpay" shortcode in posts, pages or widgets may host the vulnerable code.

Risk and Exploitability

The CVSS score of 6.4 denotes moderate severity, but the EPSS score of less than 1% suggests a low likelihood of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires authenticated access at the contributor level or higher and the attacker must embed the malicious shortcode; after that, all site visitors who view pages containing the shortcode become victims.

Generated by OpenCVE AI on April 21, 2026 at 18:33 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the Saphali LiqPay for donate plugin to a version newer than 1.0.2, which eliminates the insecure handling of shortcode attributes.
  • If a direct upgrade is not possible, temporarily remove or sanitize existing "saphali_liqpay" shortcodes that contain user‑supplied attributes and restrict the contributor role from adding or editing such content.
  • Implement a robust Content Security Policy that blocks inline script execution to mitigate any residual stored XSS payloads.

Generated by OpenCVE AI on April 21, 2026 at 18:33 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 10 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 10 Nov 2025 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Sat, 08 Nov 2025 09:30:00 +0000

Type Values Removed Values Added
Description The Saphali LiqPay for donate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'saphali_liqpay' shortcode in all versions up to, and including, 1.0.2. This is due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Saphali LiqPay for donate <= 1.0.2 - Authenticated (Contributor+) Stored Cross-Site Scripting via Shortcode
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:57:25.459Z

Reserved: 2025-11-03T19:36:09.963Z

Link: CVE-2025-12643

cve-icon Vulnrichment

Updated: 2025-11-10T14:07:21.728Z

cve-icon NVD

Status : Deferred

Published: 2025-11-08T10:15:41.637

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-12643

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T18:45:06Z

Weaknesses