Impact
The Dhivehi Text plugin contains a stored cross‑site scripting flaw in the dhivehi shortcode. Unsanitized and unescaped attributes let attackers insert arbitrary scripts. When a target visits a page containing the malicious shortcode, the injected code executes in their browser, potentially exfiltrating data, hijacking sessions, or delivering malware.
Affected Systems
dash8x Dhivehi Text plugin for WordPress, versions up to and including 0.1. The vulnerability affects any WordPress site that has these versions installed and uses the dhivehi shortcode.
Risk and Exploitability
The CVSS score of 6.4 places this vulnerability in the medium‑severity range, but the EPSS score is less than 1%, indicating a low current exploitation likelihood. It is not listed in the CISA KEV catalog. The required attacker model is authenticated with contributor or higher privileges, making it exploitable by anyone with content‑creation rights. The attack path involves creating or editing a post to include the malicious shortcode, which will then persist until removed.
OpenCVE Enrichment