WordPress PayPal Donation Vulnerability (Medium) – CVE-2026-4072

WordPress PayPal Donation Vulnerability (Medium) – CVE-2026-4072

by | Mar 20, 2026 | Plugins

Attack Vectors

WordPress PayPal Donation (slug: wordpress-paypal-donation) has a Medium-severity stored cross-site scripting (XSS) vulnerability (CVSS 6.4) tracked as CVE-2026-4072. The issue affects all versions up to and including 1.01.

The attack requires an authenticated WordPress account with at least Contributor permissions (or higher). An attacker can place a malicious payload into the plugin’s donate shortcode attributes—most notably the amount attribute, but also attributes such as email, title, return_url, cancel_url, ccode, and image.

Because the payload can be stored in content (e.g., a post or page containing the shortcode), it may execute later when another user views the affected page—often targeting higher-privilege users who review or publish content.

Security Weakness

This vulnerability is caused by insufficient input sanitization and output escaping when user-supplied shortcode attributes are processed and then placed into HTML output. In practical business terms, this means the plugin may accept untrusted values and render them in a way that allows scripted content to run in a visitor’s browser.

According to the published advisory, the plugin’s shortcode handling uses attribute extraction and then directly inserts those values into HTML attribute contexts without appropriate escaping, enabling stored (persistent) XSS rather than a one-time (reflected) attack.

There is currently no known patch available. The source advisory recommends reviewing the risk and applying mitigations, and notes that uninstalling the affected software and replacing it may be the safest approach. Reference: Wordfence vulnerability record.

Technical or Business Impacts

Stored XSS is often a “silent” brand and revenue risk because it can run in the context of your real website and trusted domain. For organizations using donation pages, the impact can extend beyond IT into marketing performance, conversion rates, and trust.

Potential business impacts include: compromised visitor trust (defacement, pop-ups, malicious redirects), reputational damage if donors are exposed to scams, and increased support burden from users reporting suspicious behavior. If an attacker targets internal staff or administrators, XSS can also enable session theft or unauthorized actions performed in the victim’s browser, potentially leading to broader site compromise.

Operational and compliance impacts: security incidents involving user exposure or unauthorized site changes can trigger incident response costs, reporting obligations depending on your jurisdiction and data involved, and disruption to active campaigns—especially if donation flows must be paused while the issue is contained.

Recommended mitigations given “no patch available”: consider uninstalling and replacing WordPress PayPal Donation immediately. If removal is not immediately possible, reduce exposure by limiting who can create or edit content that contains shortcodes, reviewing existing posts/pages for the plugin’s donate shortcode, and tightening role permissions (especially for Contributor accounts). Where feasible, implement compensating controls such as a web application firewall (WAF) and stronger change-control around content publishing.

Similar attacks (real examples): Stored XSS has a long track record of being used for account takeover and large-scale abuse. Examples include the WordPress core stored XSS fixed in 2019 (CVE-2019-9787) and the widely documented “Samy” worm that spread via XSS on MySpace (case summary).

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers