Home

Description

The Word 2 Cash plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Stored Cross-Site Scripting in versions up to and including 0.9.2. This is due to the complete absence of nonce verification on the settings save handler in the w2c_admin() function, combined with missing input sanitization before storage and missing output escaping when rendering the stored value. The w2c-definitions POST parameter is saved raw via update_option() and later echoed without escaping inside a <textarea> element. This makes it possible for unauthenticated attackers to forge a request on behalf of a logged-in administrator, storing arbitrary JavaScript payloads that execute in the WordPress admin panel whenever the settings page is visited.

PUBLISHED Reserved 2026-04-15 | Published 2026-05-20 | Updated 2026-05-20 | Assigner Wordfence




MEDIUM: 6.1CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N

Problem types

CWE-352 Cross-Site Request Forgery (CSRF)

Product status

Default status
unaffected

Any version
affected

Timeline

2026-05-19:Disclosed

Credits

Muhammad Nur Ibnu Hubab finder

References

www.wordfence.com/...-38aa-4413-83eb-29185cca2a74?source=cve

plugins.trac.wordpress.org/...ord-2-cash/trunk/word2cash.php

plugins.trac.wordpress.org/...-cash/tags/0.9.2/word2cash.php

plugins.trac.wordpress.org/...ord-2-cash/trunk/word2cash.php

plugins.trac.wordpress.org/...-cash/tags/0.9.2/word2cash.php

plugins.trac.wordpress.org/...ord-2-cash/trunk/word2cash.php

plugins.trac.wordpress.org/...-cash/tags/0.9.2/word2cash.php

cve.org (CVE-2026-6395)

nvd.nist.gov (CVE-2026-6395)

Download JSON