CVE-2026-6395 PUBLISHED

Word 2 Cash <= 0.9.2 - Cross-Site Request Forgeryto Stored Cross-Site Scripting via Settings Page

Assigner: Wordfence
Reserved: 15.04.2026 Published: 20.05.2026 Updated: 20.05.2026

The Word 2 Cash plugin for WordPress is vulnerable to Cross-Site Request Forgery leading to Stored Cross-Site Scripting in versions up to and including 0.9.2. This is due to the complete absence of nonce verification on the settings save handler in the w2c_admin() function, combined with missing input sanitization before storage and missing output escaping when rendering the stored value. The w2c-definitions POST parameter is saved raw via update_option() and later echoed without escaping inside a <textarea> element. This makes it possible for unauthenticated attackers to forge a request on behalf of a logged-in administrator, storing arbitrary JavaScript payloads that execute in the WordPress admin panel whenever the settings page is visited.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
CVSS Score: 6.1

Product Status

Vendor winking
Product Word 2 Cash
Versions Default: unaffected
  • affected from 0 to 0.9.2 (incl.)

Credits

  • Muhammad Nur Ibnu Hubab finder

References

Problem Types

  • CWE-352 Cross-Site Request Forgery (CSRF) CWE