Paypal Shortcodes Vulnerability (Medium) – CVE-2026-3617

Paypal Shortcodes Vulnerability (Medium) – CVE-2026-3617

by | Mar 20, 2026 | Plugins

Attack Vectors

CVE-2026-3617 affects the WordPress plugin Paypal Shortcodes (slug: paypal-shortcodes) in versions up to and including 0.3. The issue is a Medium-severity stored cross-site scripting (XSS) vulnerability (CVSS 6.4) that requires an attacker to be an authenticated user with Contributor privileges or higher.

The most likely attack path is through content creation workflows: an attacker (or a compromised Contributor account) adds the plugin’s shortcode to a post or page and injects malicious payloads into the amount and/or name shortcode attributes. Because the injected content is stored in WordPress content, it can execute later when the affected page is viewed by other users—potentially including editors, administrators, or site visitors.

Security Weakness

The vulnerability is caused by insufficient input sanitization and output escaping for user-supplied shortcode attributes. As documented by Wordfence, the plugin’s shortcode handler concatenates the $name and $amount values directly into HTML input element value attributes without applying appropriate escaping (for example, escaping intended for HTML attributes).

This weakness allows injected values to break out of the expected context and run attacker-controlled script code in the browser. Because it is stored, the payload can persist until the affected content is removed or corrected.

Technical or Business Impacts

Stored XSS is primarily a trust and access risk. If exploited, it can be used to hijack authenticated sessions in the browser, manipulate what users see on key pages, or perform actions on behalf of logged-in users. In practical terms, that can translate into unauthorized changes to site content, SEO spam injection, malicious redirects, or administrative actions if an admin views an infected page while logged in.

For marketing and executive teams, the business impacts typically include: brand damage from defacement or unwanted scripts, disruption to campaigns and lead flows, reduced site credibility, and potential compliance exposure if malicious scripts enable data exposure or unauthorized access paths. While this issue is rated Medium severity, the impact can escalate quickly if Contributor accounts are widely used, if accounts are shared, or if admin users routinely review front-end pages while logged in.

No patch is currently known to be available. Based on your organization’s risk tolerance, consider removing or replacing the affected plugin, restricting Contributor access, reviewing existing content for impacted shortcodes, and increasing monitoring for unexpected content changes. Reference: CVE-2026-3617 and the Wordfence advisory source.

Similar Attacks

Stored XSS in WordPress plugins has been repeatedly used to inject malicious scripts into legitimate pages and then target higher-privilege users who view those pages. Examples include:

CVE-2019-9978 (Social Warfare plugin) – stored XSS

Vantage Vulnerability (Medium) – CVE-2026-5070

Attack Vectors CVE-2026-5070 is a Medium severity vulnerability (CVSS 6.4) affecting the Vantage WordPress theme (slug: vantage) in versions up to and including 1.20.32. It enables authenticated users with Contributor access or higher to inject malicious script into a...

WP Docs Vulnerability (Medium) – CVE-2026-3878

Attack Vectors CVE-2026-3878 is a Medium severity Stored Cross-Site Scripting (XSS) vulnerability (CVSS 6.4) affecting the WP Docs WordPress plugin (wp-docs) in versions 2.2.9 and below. The issue is exploitable by an authenticated user with Subscriber-level access or...

WPFore Subscribers