Description
The NS Maintenance Mode for WP WordPress plugin through 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Published: 2025-10-30
Score: 3.5 Low
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Patch Now
AI Analysis

Impact

The vulnerability exists because the NS Maintenance Mode for WP WordPress plugin through version 1.3.1 accepts input in certain settings without sanitising or escaping it. An administrator can insert malicious script that is stored in the database and rendered in the front‑end when the site is viewed, even when the unfiltered_html capability is disabled in a multisite environment. This allows the attacker to perform stored cross‑site scripting, which could lead to session hijacking, credential theft, or the execution of arbitrary code in the context of authenticated users.

Affected Systems

WordPress sites running the NS Maintenance Mode for WP plugin version 1.3.1 or earlier. The plugin is installed on any WordPress installation, including multisite networks. Administrators can trigger the flaw through the plugin’s settings interface, and the malicious script is persisted in the database for all visitors.

Risk and Exploitability

The CVSS score of 3.5 indicates a low severity, and the EPSS score of less than 1% suggests a low probability of exploitation at this time. This stored cross‑site scripting vulnerability requires that an attacker has administrative privileges to inject malicious content via the plugin’s settings interface. It is not listed in CISA’s KEV catalog. Once the attacker achieves this injection, the stored script will be delivered to all visitors, providing a persistent client‑side compromise.

Generated by OpenCVE AI on April 28, 2026 at 10:36 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update the NS Maintenance Mode for WP plugin to the latest version, which includes proper input sanitisation.
  • If an update cannot be performed immediately, disable the plugin or remove the configuration pages that accept user input to prevent the injection of malicious code.
  • Deploy a content‑security‑policy that blocks inline scripts or restricts script sources to mitigate the impact should malicious content be stored.

Generated by OpenCVE AI on April 28, 2026 at 10:36 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Oct 2025 14:45:00 +0000

Type Values Removed Values Added
First Time appeared Nsthemes
Nsthemes ns Maintenance Mode For Wp
Wordpress
Wordpress wordpress
Vendors & Products Nsthemes
Nsthemes ns Maintenance Mode For Wp
Wordpress
Wordpress wordpress

Thu, 30 Oct 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 3.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:N'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Thu, 30 Oct 2025 06:15:00 +0000

Type Values Removed Values Added
Description The NS Maintenance Mode for WP WordPress plugin through 1.3.1 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup).
Title NS Maintenance Mode for WP <= 1.3.1 - Admin+ Stored XSS
References

Subscriptions

Nsthemes Ns Maintenance Mode For Wp
Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: WPScan

Published:

Updated: 2026-04-02T12:39:50.549Z

Reserved: 2025-09-17T13:29:16.380Z

Link: CVE-2025-10636

cve-icon Vulnrichment

Updated: 2025-10-30T14:08:25.824Z

cve-icon NVD

Status : Deferred

Published: 2025-10-30T06:15:43.577

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-10636

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-28T10:45:29Z

Weaknesses

No weakness.