CVE-2025-48102
Description
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in gourl GoUrl Bitcoin Payment Gateway & Paid Downloads & Membership gourl-bitcoin-payment-gateway-paid-downloads-membership allows Stored XSS.This issue affects GoUrl Bitcoin Payment Gateway & Paid Downloads & Membership: from n/a through <= 1.6.6.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
GoUrl Bitcoin Payment Gateway plugin ≤1.6.6 has a stored XSS bug allowing attackers to inject malicious scripts into pages viewed by other users.
Vulnerability
Overview
The GoUrl Bitcoin Payment Gateway & Paid Downloads & Membership plugin for WordPress, up to version 1.6.6, contains a stored cross-site scripting (XSS) vulnerability due to improper neutralization of user-supplied input during web page generation. This issue is classified as CWE-79 (Improper Neutralization of Input During Web Page Generation) and allows an attacker with sufficient privileges to store malicious scripts that will execute when other users visit affected pages [1].
Attack
Vector
Exploitation requires a privileged user role that can interact with input fields processed by the plugin. The attacker must inject a crafted payload, which is then stored in the database and later served to visitors without proper sanitization. User interaction is required, meaning a victim (such as an administrator or site visitor) must perform an action like clicking a link or viewing the malicious page [1]. No network-level access or authentication bypass is needed; the attacker simply needs the ability to submit content through the plugin's vulnerable forms.
Impact
Successful exploitation enables the attacker to inject arbitrary HTML and JavaScript into the affected WordPress site. This can be used to redirect visitors to malicious sites, display unwanted advertisements, steal cookies or session tokens, or perform other actions in the context of the victim's browser session. The vulnerability has a CVSS v3 base score of 5.9 (Medium), indicating moderate severity with potential for data integrity and confidentiality impact [1].
Mitigation
Patches are not yet confirmed; the plugin author is advised to release an update. As immediate protection, users should update the plugin to version 1.6.7 or later once it becomes available. If immediate updating is not possible, WordPress site administrators can implement a web application firewall (WAF) rule to block XSS payloads or temporarily disable the plugin until a fix is applied [1].
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2<=1.6.6+ 1 more
- (no CPE)range: <=1.6.6
- (no CPE)range: <=1.6.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1News mentions
0No linked articles in our index yet.