Description
Multiple plugins and/or themes for WordPress are vulnerable to Reflected Cross-Site Scripting via the url parameter in various versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2026-05-01
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a reflected DOM‑based cross‑site scripting flaw found in multiple WordPress plugins and themes. An unauthenticated attacker can inject malicious scripts through the url parameter, causing arbitrary code to run in the victim’s browser when they are tricked into visiting the crafted link. This flaw is classified as CWE‑79 and has the potential to deface content, steal session cookies, or redirect users to phishing sites.

Affected Systems

A large number of WordPress plugins and themes are affected, including Open User Map, Dynamic Copyright Year, Easy Age Verify, Featured Images in RSS for Mailchimp & More, Marijuana Age Verify, WP Post Author – Author Box, Security Ninja, Knowledge Base documentation & wiki plugin – BasePress Docs, Geo Mashup, Custom PHP Settings, Justified Gallery, YASR – Yet Another Star Rating Plugin for WordPress, and many others listed under the Freemius SDK. No specific version ranges are supplied; affected releases are <= 2.10.1.

Risk and Exploitability

The CVSS score of 6.1 indicates medium severity, and the lack of EPSS data means current exploit prevalence is unknown. The flaw requires only an active URL in the browser; a potential attacker must persuade a user to click a malicious link. The vulnerability is not listed in CISA’s KEV catalog, but because it can be triggered by unauthenticated users it remains a realistic risk for sites that can be visited by external traffic.

Generated by OpenCVE AI on May 1, 2026 at 23:53 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update all affected plugins and themes to a version that fixes the input sanitization of the url parameter.
  • If immediate update is not possible, remove or deactivate the vulnerable plugins from the site.
  • Implement a Content Security Policy to restrict script execution and add the XSS filter header.

Generated by OpenCVE AI on May 1, 2026 at 23:53 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

References
Link Providers
https://plugins.trac.wordpress.org/browser/add-search-to-menu/trunk/includes/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/featured-images-for-rss-feeds/trunk/includes/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/foobox-image-lightbox/tags/2.7.33/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/foogallery/tags/2.4.27/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/independent-analytics/trunk/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/interactive-geo-maps/tags/1.6.21/vendor/freemius/wordpress-sdk/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/internal-links/trunk/vendor/freemius/wordpress-sdk/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/master-addons/trunk/lib/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/menu-image/trunk/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/ocean-extra/trunk/includes/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/pdf-poster/trunk/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/trunk/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/simply-gallery-block/trunk/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/spotlight-social-photo-feeds/trunk/ui/freemius-pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/tablepress/trunk/libraries/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/unlimited-elements-for-elementor/trunk/provider/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/widgets-on-pages/trunk/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/woo-permalink-manager/tags/2.3.11/assets/admin/js/pricing-page/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/wp-meta-and-date-remover/tags/2.3.4/freemius/assets/js/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/browser/wpide/tags/3.5.0/dist/pricing/freemius-pricing.js cve-icon cve-icon
https://plugins.trac.wordpress.org/changeset/3229060/ cve-icon cve-icon
https://plugins.trac.wordpress.org/changeset/3235286/ cve-icon cve-icon
https://plugins.trac.wordpress.org/changeset/3249130/ cve-icon cve-icon
https://www.wordfence.com/threat-intel/vulnerabilities/id/d694491c-c0f5-4418-805a-db792ea4f712?source=cve cve-icon cve-icon
History

Fri, 01 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 06:00:00 +0000

Type Values Removed Values Added
Description Multiple plugins and/or themes for WordPress are vulnerable to Reflected Cross-Site Scripting via the url parameter in various versions due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title Freemius <= 2.10.1 - Reflected DOM-Based Cross-Site Scripting via url Parameter
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-05-01T13:23:26.723Z

Reserved: 2025-01-13T18:08:47.439Z

Link: CVE-2024-13362

cve-icon Vulnrichment

Updated: 2026-05-01T13:23:20.321Z

cve-icon NVD

Status : Deferred

Published: 2026-05-01T06:16:30.050

Modified: 2026-05-01T15:26:24.553

Link: CVE-2024-13362

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T00:00:14Z

Weaknesses