Description
The DWT - Directory & Listing WordPress Theme is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 3.3.3 due to insufficient input sanitization and output escaping on the 'sort_by' and 'token' parameters. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Published: 2025-01-16
Score: 6.1 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The DWT – Directory & Listing WordPress Theme is affected by a reflected cross‑site scripting flaw. The bug stems from insufficient sanitization and output escaping on the sort_by and token URL parameters, allowing an attacker to inject arbitrary client‑side scripts when a victim follows a crafted link. This could enable defacement, credential theft, or execution of malicious actions in the victim’s browser, depending on the user’s privileges. The weakness is an instance of CWE‑79, Improper Neutralization of Input During Web Page Generation.

Affected Systems

This vulnerability affects the ScriptsBundle DWT – Directory & Listing WordPress Theme versions up to and including 3.3.3. No other vendors or product variants were identified as impacted by the CNA advisory. Any WordPress deployment using one of these affected theme releases is therefore at risk.

Risk and Exploitability

The CVSS base score is 6.1, indicating a moderate severity for a reflected XSS vector. The EPSS score of less than 1% suggests that the probability of active exploitation at any given time is low, and the issue is not currently listed in CISA’s KEV catalog. Nonetheless, because the attack requires only a malicious link and no authentication, a widespread social engineering campaign could effectively target users if the vulnerability remains unpatched.

Generated by OpenCVE AI on April 21, 2026 at 22:29 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the DWT theme to the latest release that contains the XSS fix (Version 3.3.4 or newer).
  • If an immediate update is not possible, reconfigure the theme or the WordPress environment to strictly validate and encode the sort_by and token parameters, or block their usage through a security plugin.
  • Deploy a site‑wide Content Security Policy that blocks inline script execution and enables browser XSS filtering to mitigate potential script injection.

Generated by OpenCVE AI on April 21, 2026 at 22:29 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-1521 The DWT - Directory & Listing WordPress Theme is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 3.3.3 due to insufficient input sanitization and output escaping on the 'sort_by' and 'token' parameters. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
History

Thu, 16 Jan 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 16 Jan 2025 02:15:00 +0000

Type Values Removed Values Added
Description The DWT - Directory & Listing WordPress Theme is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 3.3.3 due to insufficient input sanitization and output escaping on the 'sort_by' and 'token' parameters. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link.
Title DWT - Directory & Listing WordPress Theme <= 3.3.3 - Reflected Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N'}


Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:26:15.794Z

Reserved: 2025-01-02T07:18:27.588Z

Link: CVE-2025-0170

cve-icon Vulnrichment

Updated: 2025-01-16T15:31:33.553Z

cve-icon NVD

Status : Deferred

Published: 2025-01-16T02:15:27.043

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-0170

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T22:30:06Z

Weaknesses