VYPR
High severity7.1NVD Advisory· Published Apr 24, 2025· Updated Apr 23, 2026

CVE-2025-46499

CVE-2025-46499

Description

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in hccoder PayPal Express Checkout paypal-express-checkout allows Stored XSS.This issue affects PayPal Express Checkout: from n/a through <= 2.1.2.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Stored XSS in PayPal Express Checkout plugin for WordPress (<=2.1.2) allows attackers to inject persistent JavaScript via unneutralized input.

Vulnerability

Overview The PayPal Express Checkout plugin for WordPress, versions 2.1.2 and earlier, contains a stored cross-site scripting (XSS) vulnerability due to improper neutralization of input during web page generation [1]. This Stored XSS flaw allows an attacker to inject malicious scripts that are permanently stored on the server and executed in the browsers of other users when they access the affected page. The root cause is insufficient sanitization or validation of user-supplied data before it is included in output that is rendered by a victim's browser [1].

Exploitation

Conditions To exploit this vulnerability, an attacker must have a role that can submit input to the plugin, such as a contributor or subscriber, depending on the specific vulnerable field [1]. Successful exploitation does not require high privileges but does require user interaction: a victim (typically an administrator or other higher-privileged user) must perform an action such as clicking a link, visiting a crafted page, or submitting a form that triggers the stored payload [1]. The attack can be performed over the network without special access beyond the ability to inject content.

Impact

If exploited, the attacker can execute arbitrary JavaScript in the context of the victim's browser session. This can lead to session hijacking, defacement, theft of sensitive data (including authentication tokens), or forced actions on behalf of the victim within the WordPress admin panel. Given the prevalence of WordPress mass-exploit campaigns, this vulnerability may be targeted to compromise thousands of sites at once [1].

Mitigation

Users are strongly advised to update the PayPal Express Checkout plugin to a patched version immediately [1]. Those unable to update should seek assistance from their hosting provider or web developer to apply temporary workarounds, such as disabling the plugin or implementing a web application firewall (WAF) rule to block malicious input. No known permanent fix exists for unsupported versions [1].

AI Insight generated on May 20, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.