The Simple Membership plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'swpm_paypal_subscription_cancel_link' shortcode in all versions up to, and including, 4.4.3 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
                
            References
                    Configurations
                    History
                    05 Feb 2025, 16:44
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:simple-membership-plugin:simple_membership:*:*:*:*:*:wordpress:*:* | |
| References | () https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3076221%40simple-membership&new=3076221%40simple-membership&sfp_email=&sfph_mail=#file31 - Product | |
| References | () https://www.wordfence.com/threat-intel/vulnerabilities/id/63779ab7-ba8b-459d-beb3-a32faf8f4394?source=cve - Third Party Advisory | |
| First Time | Simple-membership-plugin Simple-membership-plugin simple Membership | |
| CWE | CWE-79 | 
Information
                Published : 2024-04-25 11:15
Updated : 2025-02-05 16:44
NVD link : CVE-2024-3730
Mitre link : CVE-2024-3730
CVE.ORG link : CVE-2024-3730
JSON object : View
Products Affected
                simple-membership-plugin
- simple_membership
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
