Description
The Footnotes Made Easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin settings in all versions up to, and including, 3.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-04
Score: 7.2 High
EPSS: < 1% Very Low
KEV: No
Impact: Stored Cross‑Site Scripting
Action: Immediate Patch
AI Analysis

Impact

The Footnotes Made Easy plugin for WordPress contains insufficient input sanitization and output escaping in its settings editor. A user who is not authenticated can submit arbitrary scripts that are stored and later rendered in the plugin output. When a visitor loads a page with the injected content, the browser executes the malicious script in the context of the site, allowing the attacker to hijack sessions, deface content, or perform other client‑side attacks. This vulnerability is classified as CWE‑79.

Affected Systems

All installations of the Footnotes Made Easy plugin with a version of 3.0.7 or earlier are vulnerable. The affected vendor is Lumiblog and the product is the Footnotes Made Easy WordPress plugin.

Risk and Exploitability

The community CVSS score of 7.2 indicates a high severity, while the EPSS score of less than 1% suggests a very low probability of exploitation at the present time. The vulnerability is not currently listed in the CISA KEV catalog. Since the flaw allows unauthenticated users to inject scripts, the attack vector is likely through any user with access to the plugin settings interface. Even though exploitation requires input into the settings, the impact remains significant due to the ability to affect all site visitors.

Generated by OpenCVE AI on April 21, 2026 at 01:54 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Update Footnotes Made Easy to version 3.0.8 or later.
  • If an update cannot be applied immediately, remove or deactivate the plugin until a fixed release is available.
  • Configure the site so that only administrators can modify plugin settings, reducing the risk that unprivileged users can inject script payloads.

Generated by OpenCVE AI on April 21, 2026 at 01:54 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 08 Apr 2026 18:30:00 +0000

Type Values Removed Values Added
References

Tue, 04 Nov 2025 16:45:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Tue, 04 Nov 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 04 Nov 2025 04:45:00 +0000

Type Values Removed Values Added
Description The Footnotes Made Easy plugin for WordPress is vulnerable to Stored Cross-Site Scripting via plugin settings in all versions up to, and including, 3.0.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title Footnotes Made Easy <= 3.0.7 - Unauthenticated Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 7.2, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T17:21:19.086Z

Reserved: 2025-10-14T09:30:22.938Z

Link: CVE-2025-11733

cve-icon Vulnrichment

Updated: 2025-11-04T15:10:33.460Z

cve-icon NVD

Status : Deferred

Published: 2025-11-04T05:15:57.840

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11733

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T02:00:12Z

Weaknesses