Description
The WPSite Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'format' shortcode attribute in the wpsite_y shortcode and the 'before' attribute in the wpsite_postauthor shortcode in all versions up to, and including, 1.2. This is due to insufficient input sanitization and output escaping in error messages. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Published: 2025-11-21
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stored cross-site scripting with contributor or higher privilege
Action: Patch
AI Analysis

Impact

The WPSite Shortcode plugin for WordPress allows stored cross-site scripting through the unsanitized "format" attribute of the wpsite_y shortcode and the "before" attribute of the wpsite_postauthor shortcode in all versions up to 1.2. By injecting malicious JavaScript in these attributes, an authenticated user with contributor or higher privileges can store scripts that execute whenever any user views a page containing the shortcode, enabling potential session hijacking, data theft, or site defacement.

Affected Systems

All installations of the WPSite Shortcode plugin for WordPress where the version is 1.2 or older. The affected vendor is wpfanyi and the plugin names as listed. Users who possess contributor or higher level permissions are able to exploit the flaw; thus any WordPress site running the vulnerable plugin with such user accounts is at risk.

Risk and Exploitability

The vulnerability carries a CVSS score of 6.4, classifying it as a moderate severity issue. The EPSS score is under 1%, indicating a very low probability of exploitation in the wild. It is not included in the CISA KEV catalog. Because the flaw requires authenticated access, attackers need at least contributor privilege to inject malicious payloads. Exploitation is achieved by posting a content piece that includes the malicious shortcode, which is then stored and rendered for all site visitors.

Generated by OpenCVE AI on April 22, 2026 at 21:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade WPSite Shortcode to the latest available version (≥ 1.3).
  • If upgrading is not possible, remove the vulnerable shortcode attributes or block the functional usage of the affected shortcodes.
  • Restrict contributor and higher level users from creating posts that could contain shortcodes until a patch is applied.

Generated by OpenCVE AI on April 22, 2026 at 21:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 24 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 24 Nov 2025 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Wordpress
Wordpress wordpress
Vendors & Products Wordpress
Wordpress wordpress

Fri, 21 Nov 2025 08:45:00 +0000

Type Values Removed Values Added
Description The WPSite Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'format' shortcode attribute in the wpsite_y shortcode and the 'before' attribute in the wpsite_postauthor shortcode in all versions up to, and including, 1.2. This is due to insufficient input sanitization and output escaping in error messages. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page.
Title WPSite Shortcode <= 1.2 - Authenticated (Contributor+) Stored Cross-Site Scripting
Weaknesses CWE-79
References
Metrics cvssV3_1

{'score': 6.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N'}


Subscriptions

Wordpress Wordpress
cve-icon MITRE

Status: PUBLISHED

Assigner: Wordfence

Published:

Updated: 2026-04-08T16:35:17.464Z

Reserved: 2025-10-15T14:34:38.233Z

Link: CVE-2025-11803

cve-icon Vulnrichment

Updated: 2025-11-21T16:05:46.210Z

cve-icon NVD

Status : Deferred

Published: 2025-11-21T09:15:45.507

Modified: 2026-04-15T00:35:42.020

Link: CVE-2025-11803

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-22T21:15:27Z

Weaknesses