CVE-2025-7669
Description
The Avishi WP PayPal Payment Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0. This is due to missing or incorrect nonce validation on the 'avishi-wp-paypal-payment-button/index.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
The Avishi WP PayPal Payment Button plugin for WordPress is vulnerable to CSRF due to missing nonce validation, allowing attackers to inject malicious scripts and update settings.
Vulnerability
Details
The Avishi WP PayPal Payment Button plugin for WordPress versions 2.0 and earlier is vulnerable to Cross-Site Request Forgery (CSRF) due to missing or incorrect nonce validation on the plugin's admin page (avishi-wp-paypal-payment-button/index.php). This allows an unauthenticated attacker to perform unauthorized actions on behalf of a site administrator.
Exploitation
The vulnerability can be exploited by tricking a logged-in administrator into visiting a crafted link. No authentication is required from the attacker's side. This is a classic CSRF attack vector, where the attacker can force the administrator to unknowingly submit a request to the plugin's settings page.
Impact
A successful exploit enables the attacker to modify plugin settings and, critically, inject malicious web scripts. This can lead to stored cross-site scripting (XSS) if the injected scripts are output on admin-facing pages, potentially compromising the site's security.
Mitigation
The plugin has been closed as of July 17, 2025, and is no longer available for download due to this security issue [1]. As no patch is available, users are strongly advised to remove the plugin from their WordPress installations.
AI Insight generated on May 19, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
2(expand)+ 1 more
- (no CPE)
- (no CPE)range: <=2.0
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3News mentions
0No linked articles in our index yet.