CyberAlerts is shutting down on June 30th, 2025. Thank you for your support!

CVE-2025-7669: Avishi WP PayPal Payment Button <= 2.0 - Cross-Site Request Forgery to Stored Cross-Site Scripting

6.1 CVSS

Description

The Avishi WP PayPal Payment Button plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.0. This is due to missing or incorrect nonce validation on the 'avishi-wp-paypal-payment-button/index.php' page. This makes it possible for unauthenticated attackers to update settings and inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link.

Classification

CVE ID: CVE-2025-7669

CVSS Base Severity: MEDIUM

CVSS Base Score: 6.1

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem Types

CWE-352 Cross-Site Request Forgery (CSRF)

Affected Products

Vendor: avishika

Product: Avishi WP PayPal Payment Button

References

https://nvd.nist.gov/vuln/detail/CVE-2025-7669
https://www.wordfence.com/threat-intel/vulnerabilities/id/8416b394-28ae-41de-8784-2ae39f4d201f?source=cve
https://plugins.trac.wordpress.org/browser/avishi-wp-paypal-payment-button/trunk/index.php
https://wordpress.org/plugins/avishi-wp-paypal-payment-button/

Timeline