Impact
The vulnerability is a stored cross‑site scripting flaw that is triggered when an authenticated user manipulates the Logo URL parameter in the Brand component of the WordPress Theme Wibar. By inserting a base64‑encoded script into the ftc_brand_url input field, attackers can embed arbitrary JavaScript that will execute when users visit the brand page.
Affected Systems
WordPress Theme Wibar version 1.1.8, affecting users with editor, administrator, contributor, and author roles.
Risk and Exploitability
The CVSS score of 5.1 indicates a moderate severity level, and there is no EPSS data available, with the vulnerability not listed in the CISA KEV catalog. Attack requires authenticated privileges; once the script is stored it executes automatically for every visitor to the brand page, creating a persistent threat. The lack of exploitation data means the likelihood of exploitation remains uncertain, but the impact is significant for sites using this theme.
OpenCVE Enrichment