Description
The BP Direct Menus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bpdm_login' shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-09-30
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting – arbitrary script execution on pages viewed by users that contain injected content.
Action: Immediate Update
AI Analysis

Impact

The vulnerability exists in BP Direct Menus versions up to and including 1.0.0 and is caused by insufficient sanitization and escaping of attributes passed to the plugin’s ‘bpdm_login’ shortcode. An authenticated attacker with contributor level or higher privileges can inject malicious scripts into the attribute value. When an affected user accesses a page that contains the injected shortcode, the stored script runs in the context of the user’s browser, allowing the attacker to hijack user sessions, deface content, or exfiltrate data. This flaw is identified as CWE‑79, a classic cross‑site scripting weakness that compromises confidentiality, integrity, and availability of the web application for all users who view the compromised pages.

Affected Systems

WordPress sites that have the BP Direct Menus plugin installed, specifically any instance of the plugin with version 1.0.0 or older. The vendor is mrwulf, and the vulnerability applies to all affected releases before 1.0.0. No additional affected versions are listed, so any site still running the default maximum version is at risk.

Risk and Exploitability

The CVSS score of 6.4 indicates a moderate severity, while the EPSS score is lower than 1 % suggesting a low probability that such an attack will be observed in the wild. The flaw is not currently listed in CISA’s KEV catalog, but because the exploit requires authenticated access, it can be performed by anyone who has contributor-level privileges on the site. Attackers that can obtain or elevate to contributor status could deploy hidden scripts, compromising other users’ sessions and data. The primary attack vector is via normal page rendering after a contributor inserts malicious code into the shortcode. The likelihood of exploitation is low but not negligible, and the impact can affect all users who view the affected content.

Generated by OpenCVE AI on April 21, 2026 at 18:58 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the BP Direct Menus plugin to the latest available version or apply a vendor‑supplied patch if one is released.
  • If an update is not immediately possible, remove or disable the ‘bpdm_login’ shortcode from any pages or templates that are used by contributors.
  • Ensure that any attribute values passed to the shortcode are properly validated and escaped, removing scripting tags and content, to enforce input sanitization in any custom code that invokes the plugin.

Generated by OpenCVE AI on April 21, 2026 at 18:58 UTC.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2025-31681 The BP Direct Menus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bpdm_login' shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
History

Tue, 30 Sep 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 30 Sep 2025 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 30 Sep 2025 03:45:00 +0000

Type Values Removed Values Added
Description The BP Direct Menus plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'bpdm_login' shortcode in all versions up to, and including, 1.0.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title BP Direct Menus <= 1.0.0 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:21:52.055Z

Reserved: 2025-09-09T15:48:28.659Z

Link: CVE-2025-10189

cve-icon Vulnrichment

Updated: 2025-09-30T15:36:02.509Z

cve-icon NVD

Status : Deferred

Published: 2025-09-30T11:37:38.040

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10189

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T19:00:36Z

Weaknesses