Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in growniche Simple Stripe Checkout simple-stripe-checkout allows Reflected XSS.This issue affects Simple Stripe Checkout: from n/a through <= 1.1.28.
Published: 2025-10-22
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a reflected XSS in the Simple Stripe Checkout plugin caused by improper neutralization of user input before rendering it in a web page. Attackers can supply malicious scripts via query parameters or form data that are echoed unsanitized to a page. If executed in a user’s browser, the script runs with the same privileges as the site, allowing theft of cookies, session hijack, or other malicious actions. The weakness matches CWE‑79.

Affected Systems

The plugin version 1.1.28 and earlier are affected. This includes all WordPress sites that have installed "Simple Stripe Checkout" from the Growniche developer before the 1.1.29 release (or newer). Any installation that has the plugin activated, regardless of who owns the site, is potentially vulnerable. The impact applies to all users who view pages rendered by the plugin.

Risk and Exploitability

With a CVSS score of 7.1 the vulnerability scores in the high range. The EPSS score of less than 1% indicates that usage of the exploit is expected to be low at present. The vulnerability is not listed in the CISA KEV catalog. Attackers can craft a malicious link that, when visited by a user, injects JavaScript into the checkout page; no authentication or local exploitation is required. The simplest attack path is through a reflected XSS vector that requires only that the victim opens a crafted URL or is tricked into interacting with the plugin output.

Generated by OpenCVE AI on April 29, 2026 at 16:37 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Simple Stripe Checkout to the latest version (1.1.29 or newer).
  • If an update is not immediately possible, disable the plugin until the update is applied.
  • Monitor security releases from the developer and review plugin updates regularly to avoid similar issues.

Generated by OpenCVE AI on April 29, 2026 at 16:37 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 20 Jan 2026 15:30:00 +0000


Tue, 20 Jan 2026 14:45:00 +0000


Thu, 13 Nov 2025 11:30:00 +0000


Thu, 13 Nov 2025 10:45:00 +0000


Thu, 23 Oct 2025 18:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

cvssV3_1

{'score': 7.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L'}


Thu, 23 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Growniche
Growniche simple Stripe Checkout
Wordpress
Wordpress wordpress
Vendors & Products Growniche
Growniche simple Stripe Checkout
Wordpress
Wordpress wordpress

Wed, 22 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
Description Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in growniche Simple Stripe Checkout simple-stripe-checkout allows Reflected XSS.This issue affects Simple Stripe Checkout: from n/a through <= 1.1.28.
Title WordPress Simple Stripe Checkout plugin <= 1.1.28 - Cross Site Scripting (XSS) vulnerability
Weaknesses CWE-79
References

Subscriptions

Growniche Simple Stripe Checkout
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Patchstack

Published:

Updated: 2026-04-28T20:29:24.942Z

Reserved: 2025-06-11T16:07:34.181Z

Link: CVE-2025-49963

cve-icon Vulnrichment

Updated: 2025-10-23T14:13:15.082Z

cve-icon NVD

Status : Deferred

Published: 2025-10-22T15:15:43.157

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-49963

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-29T16:45:15Z

Weaknesses